메뉴 건너뛰기




Volumn 39, Issue 1, 2007, Pages

A survey on peer-to-peer key management for mobile ad hoc networks

Author keywords

Mobile ad hoc networks; Pairwise key management; Peer to peer key management; Security

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 34147173361     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1216370.1216371     Document Type: Review
Times cited : (151)

References (99)
  • 2
    • 0036688074 scopus 로고    scopus 로고
    • AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIBCI. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 8 (Aug.), 102-114.
    • AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIBCI. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 8 (Aug.), 102-114.
  • 4
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks
    • AYANOGLU, E., I, C.-L., GITLIN, R. D., AND MAZO, J. E. 1993. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Trans. Commun. 41, 11, 1677-1686.
    • (1993) IEEE Trans. Commun , vol.41 , Issue.11 , pp. 1677-1686
    • AYANOGLU, E.I.C.-L.1    GITLIN, R.D.2    MAZO, J.E.3
  • 6
    • 0000893265 scopus 로고
    • An optimal class of symmetric key generation systems
    • BLOM, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84.
    • (1985) Proceedings of EUROCRYPT'84
    • BLOM, R.1
  • 12
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • BUTTYAN, L. AND HUBAUX, J. P. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM Mobile Netw. Appl. 8, 5, 579-592.
    • (2003) ACM Mobile Netw. Appl , vol.8 , Issue.5 , pp. 579-592
    • BUTTYAN, L.1    HUBAUX, J.P.2
  • 13
    • 31344438973 scopus 로고    scopus 로고
    • Proc. IEEE (Special Issue on Cryptography and Security) 94
    • 2
    • CAGALJ, M., CAPKUN, S., AND HUBAUX, J. 2006. Key agreement in peer-to-peer wireless networks. Proc. IEEE (Special Issue on Cryptography and Security) 94, 2, 467-478.
    • (2006) , pp. 467-478
    • CAGALJ, M.1    CAPKUN, S.2    HUBAUX, J.3
  • 15
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • CAPKUN, S., BUTTYAN, L., AND HUBAUX, J.-P. 2003b. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2, 1, 52-64.
    • (2003) IEEE Trans. Mobile Comput , vol.2 , Issue.1 , pp. 52-64
    • CAPKUN, S.1    BUTTYAN, L.2    HUBAUX, J.-P.3
  • 20
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • CHAN, H. AND PERRIG, A. 2005. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of INFOCOM'05.
    • (2005) Proceedings of INFOCOM , vol.5
    • CHAN, H.1    PERRIG, A.2
  • 22
    • 3042548790 scopus 로고    scopus 로고
    • A zonal algorithm for clustering ad hoc networks
    • CHEN, Y P. AND LIESTMAN, A. L. 2003. A zonal algorithm for clustering ad hoc networks. Int. J. Foundat. Comput. Sci. 14, 2, 305-322.
    • (2003) Int. J. Foundat. Comput. Sci , vol.14 , Issue.2 , pp. 305-322
    • CHEN, Y.P.1    LIESTMAN, A.L.2
  • 24
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • Tech. rep. UM-CS-2001-037. University of Massachusetts, Amherst, MA
    • DAHILL, B., LEVINE, E., ROYER, E., AND SHIELDS, C. 2001. A secure routing protocol for ad hoc networks. Tech. rep. UM-CS-2001-037. University of Massachusetts, Amherst, MA.
    • (2001)
    • DAHILL, B.1    LEVINE, E.2    ROYER, E.3    SHIELDS, C.4
  • 27
    • 0038061165 scopus 로고    scopus 로고
    • Redistributing secret shares to new access structures and its applications
    • Tech. rep. ISSE-TR-97-01. Department of Information and Software Engineering, School of Information Technology and Engineering, George Mason University, Fairfax, VA
    • DESMEDT, Y. AND JAJODIA, S. 1997. Redistributing secret shares to new access structures and its applications. Tech. rep. ISSE-TR-97-01. Department of Information and Software Engineering, School of Information Technology and Engineering, George Mason University, Fairfax, VA.
    • (1997)
    • DESMEDT, Y.1    JAJODIA, S.2
  • 28
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • DOLEV, D. AND YAO, A. C. 1983. On the security of public key protocols. IEEE Trans. Inform. Theor. 29, 2, 198-208.
    • (1983) IEEE Trans. Inform. Theor , vol.29 , Issue.2 , pp. 198-208
    • DOLEV, D.1    YAO, A.C.2
  • 30
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • DU, W., DENG, J., HAN, Y., CHEN, S., AND VAHSHNEY, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04.
    • (2004) Proceedings of INFOCOM , vol.4
    • DU, W.1    DENG, J.2    HAN, Y.3    CHEN, S.4    VAHSHNEY, P.5
  • 46
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad-hoc wireless networks
    • T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers
    • JOHNSON, D. B. AND MALTZ, D. A. 1996. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • JOHNSON, D.B.1    MALTZ, D.A.2
  • 48
    • 28444488609 scopus 로고    scopus 로고
    • Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis
    • JOSHI, D., NAMUDURI, K., AND PENDSE, R. 2005. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. EURASIP J. Wireless Commun. Netw. 4, 579-589.
    • (2005) EURASIP J. Wireless Commun. Netw , vol.4 , pp. 579-589
    • JOSHI, D.1    NAMUDURI, K.2    PENDSE, R.3
  • 49
    • 0008482739 scopus 로고    scopus 로고
    • ID-based secret-key cryptography
    • JOYE, M. AND YEN, S.-M. 1998. ID-based secret-key cryptography. ACM Operat. Syst. Rev. 32, 4, 33-39.
    • (1998) ACM Operat. Syst. Rev , vol.32 , Issue.4 , pp. 33-39
    • JOYE, M.1    YEN, S.-M.2
  • 50
    • 0023139974 scopus 로고
    • The DARPA Packet Radio Network Protocol
    • JUBIN, J. AND TORNOW, J. D. 1987. The DARPA Packet Radio Network Protocol. IEEE 75, 1, 21-32.
    • (1987) IEEE 75 , vol.1 , pp. 21-32
    • JUBIN, J.1    TORNOW, J.D.2
  • 55
    • 0033181509 scopus 로고    scopus 로고
    • t, n) Threshold digital signature with traceability property
    • LEE, W.-B. AND CHANG, C.-C. 1999. (t, n) Threshold digital signature with traceability property. J. Inform. Sci. Eng. 15, 5, 669-678.
    • (1999) J. Inform. Sci. Eng , vol.15 , Issue.5 , pp. 669-678
    • LEE, W.-B.1    CHANG, C.-C.2
  • 61
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • LIU, D., NING, P., AND RONGFANG, L. 2005b. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1, 41-77.
    • (2005) ACM Trans. Inform. Syst. Sec. 8 , vol.1 , pp. 41-77
    • LIU, D.1    NING, P.2    RONGFANG, L.3
  • 77
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Commun. ACM 22, 11, 612-613.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • SHAMIR, A.1
  • 82
    • 0002644727 scopus 로고    scopus 로고
    • Attacks on threshold signature schemes with traceable signers
    • TSENG, Y.-M. AND JAN, J.-K. 1999. Attacks on threshold signature schemes with traceable signers. Inform. Process. Lett. 71, 1, 1-4.
    • (1999) Inform. Process. Lett , vol.71 , Issue.1 , pp. 1-4
    • TSENG, Y.-M.1    JAN, J.-K.2
  • 83
    • 0032098148 scopus 로고    scopus 로고
    • Threshold signature schemes with traceable signers in group communications
    • WANG, C.-T., LIN, C.-H., AND CHANG, C.-C. 1998. Threshold signature schemes with traceable signers in group communications. Comput. Commun. 21, 8, 771-776.
    • (1998) Comput. Commun , vol.21 , Issue.8 , pp. 771-776
    • WANG, C.-T.1    LIN, C.-H.2    CHANG, C.-C.3
  • 87
    • 33746299217 scopus 로고    scopus 로고
    • WU, B., WU, J., FERNANDEZ, E. B., AND MAGLIVERAS, S. 2005b. Secure and efficient key management in mobile ad hoc networks. In Proceedings of the First International Workshop on Systems and Network Security (SNS2005) (in conjunction with IPDPS).
    • WU, B., WU, J., FERNANDEZ, E. B., AND MAGLIVERAS, S. 2005b. Secure and efficient key management in mobile ad hoc networks. In Proceedings of the First International Workshop on Systems and Network Security (SNS2005) (in conjunction with IPDPS).
  • 88
    • 2342489478 scopus 로고    scopus 로고
    • Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
    • WU, T.-S. AND HSU, C.-L. 2004. Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers. Comput. Stand. Interfac. 26, 5, 477-481.
    • (2004) Comput. Stand. Interfac , vol.26 , Issue.5 , pp. 477-481
    • WU, T.-S.1    HSU, C.-L.2
  • 90
    • 34147157884 scopus 로고    scopus 로고
    • YI, S. AND KHAVETS, R. 2001. Practical PKI for ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2273, UILU-ENG-2002-1717. Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL.
    • YI, S. AND KHAVETS, R. 2001. Practical PKI for ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2273, UILU-ENG-2002-1717. Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL.
  • 91
    • 34147093793 scopus 로고    scopus 로고
    • YI, S. AND KRAVETS, R. 2002a. Key management for heterogeneous ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2290, UILU-ENG-2002-1734. Department of Computer Science, University of Illinois. at Urbana-Champaign, Urbana, IL.
    • YI, S. AND KRAVETS, R. 2002a. Key management for heterogeneous ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2290, UILU-ENG-2002-1734. Department of Computer Science, University of Illinois. at Urbana-Champaign, Urbana, IL.
  • 97
    • 0033357103 scopus 로고    scopus 로고
    • ZHOU, L. AND HAAS, Z. J. 1999. Securing ad hoc networks. IEEE Netw. (Special Issue on Network Security) 13, 6, 24-30.
    • ZHOU, L. AND HAAS, Z. J. 1999. Securing ad hoc networks. IEEE Netw. (Special Issue on Network Security) 13, 6, 24-30.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.