메뉴 건너뛰기




Volumn 80, Issue 10, 2007, Pages 1667-1677

A hierarchical key management scheme for secure group communications in mobile ad hoc networks

Author keywords

Group communication; Group key; Key management; Mobile ad hoc networks; Network security

Indexed keywords

CRYPTOGRAPHY; HIERARCHICAL SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34547743395     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2006.12.564     Document Type: Article
Times cited : (44)

References (27)
  • 2
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for secure multicast
    • Chan K.-C., and Chan S.-H. Key management approaches to offer data confidentiality for secure multicast. IEEE Network October (2003) 30-39
    • (2003) IEEE Network , Issue.October , pp. 30-39
    • Chan, K.-C.1    Chan, S.-H.2
  • 3
    • 1642635188 scopus 로고    scopus 로고
    • Chang, C.-C., Chung, C.-Y., 2003. An efficient session key generation protocol. In: Proceedings of the 2003 IEEE International Conference on Communication Technology, Beijing, China, April 9-11, pp. 203-207.
  • 4
    • 33845412961 scopus 로고    scopus 로고
    • Chen, I.-R., Cho, J.-H., Wang, D.-C., 2006. Performance characteristics of region-based group key management in mobile ad hoc networks. In: Proceedings of the IEEE International Conference on Sensor Networks, vol. 1, June, pp. 411-419.
  • 5
    • 84943265930 scopus 로고    scopus 로고
    • Chiang, T.-C., Huang, Y.-M., 2003. Group keys and the multicast security in ad hoc networks. In: Proceedings of the 2003 IEEE International Conference on Parallel Processing Workshops, Kaohsiung, Taiwan, ROC, October 6-9, pp. 385-290.
  • 6
    • 21644478900 scopus 로고    scopus 로고
    • Choudhary, M., Sharma, P., Sanghi, D., 2004. Secure multicast model for ad-hoc military networks. In: Proceedings of the 12th IEEE International Conference on Networks, Singapore, November 16-19, pp. 683-688.
  • 7
    • 27644528961 scopus 로고    scopus 로고
    • Dhurandher, S.K., Singh, G.V., 2005. Weight based adaptive clustering in wireless ad hoc networks. In: Proceedings of the 2005 IEEE International Conference on Personal Wireless Communications, New Delhi, India, January 23-25, pp. 95-100.
  • 8
    • 54349093602 scopus 로고    scopus 로고
    • Huang, C.-C., Chang, R.-S., Guo, M.-H., 2003. Weight-based clustering multicast routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE Conference on Wireless Communications and Networking, New Orleans, LA, USA, March 16-20, pp. 1112-1117.
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Jablon, P.D., 1996. Strong password-only authenticated key exchange. In: Proceedings of the 1996 Computer Communications, New York, USA, October, pp. 5-26.
  • 10
    • 84963704200 scopus 로고    scopus 로고
    • Liu, J., Zhou, M., 2002. Key management and access control for large dynamic multicast group. In: Proceedings of the 4th IEEE Conference on International Workshop, Newport Beach, CA, USA, June 26-28, pp. 121-128.
  • 12
    • 84890485320 scopus 로고    scopus 로고
    • Marwaha, S., Chen, K.T., Srinivasan, D., 2002. A novel routing protocol using mobile agents and reactive route discovery for ad hoc wireless networks. In: Proceedings of the 10th IEEE International Conference on Networks, Singapore, August 27-30, pp. 311-316.
  • 13
    • 84904888755 scopus 로고    scopus 로고
    • Mirkovic, J., Prier, G., Reiher, P., 2002. Attack DDoS at the source. In: Proceedings of the 2002 IEEE International Conference on Network Protocol, Paris, France, November 12-15, pp. 312-321.
  • 14
  • 15
    • 11244345395 scopus 로고    scopus 로고
    • Mukherjee, A., Gupta, M., Hongmei, D., Agrawal, D.P., 2004. Level-based key establishment for multicast communication in mobile ad hoc networks. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Barcelona, September 5-8, pp. 2871-2875.
  • 16
    • 0010946219 scopus 로고    scopus 로고
    • Pagani, E., Rossi, G.P., 1999. An on-demand shared tree with hybrid state for multicast routing in ad hoc mobile wireless networks. In: Proceedings of the 1999 IEEE International Workshop on Parallel Proceeding, Aizu-Wakamatsu City, Japan, September 21-24, pp. 4-9.
  • 17
    • 33646552392 scopus 로고    scopus 로고
    • Patwardhan, A., Parker, J., Joshi, A., Lorga, M., Kaygiannis, T., 2005. Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, USA, March 8-12, pp. 191-199.
  • 19
    • 9744282769 scopus 로고    scopus 로고
    • Purtoosi, R., Taheri, H., Mohammadi, A., Foroozan, F., 2004. A light-weight contention-based clustering algorithm for wireless ad hoc networks. In: Proceedings of the IEEE International Conference on Computers and Information Technology, Wuhan, China, September 14-16, pp. 627-632.
  • 20
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafaeli S., and Hutchison D. A survey of key management for secure group communication. ACM Computing Surveys (CSUR) September (2003) 309-329
    • (2003) ACM Computing Surveys (CSUR) , Issue.September , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 21
    • 84961777801 scopus 로고    scopus 로고
    • Russell, S.F., 2001. Wireless network security for users. In: Proceedings of the 2001 International Conference on Coding and Computing, Las Vegas, USA, April 2-4, pp. 172-177.
  • 22
    • 4544317724 scopus 로고    scopus 로고
    • Schmoyer, T.R., Lin, Y.X., Owen, H.L., 2004. Wireless intrusion detection and response: a classic study using main-in-the-middle attack. In: Proceedings of the 2004 International Conference on Wireless Communications and Networking (WCNC), Atlanta, USA, March 21-25, pp. 883-888.
  • 23
    • 0029720059 scopus 로고    scopus 로고
    • Steiner, M., Tsudik, G., Waidner, M., 1996. Diffie-Hellman key distribution extended to group communication. In: Proceedings of the Third ACM Conference on Computer and Communications Security, New Delhi, India, March, pp. 31-37.
  • 24
    • 0031629148 scopus 로고    scopus 로고
    • Steiner, M., Tsudik, G., Waidner, M., 1998. CLIQUES: a new approach to group key agreement. In: Proceedings of the 18th IEEE International Conference on Distributed Computing System, Amsterdam, Netherlands, May 26-29, pp. 380-387.
  • 25
    • 34547815211 scopus 로고    scopus 로고
    • A secure group communication protocol for ad hoc wireless networks
    • Advances in Wireless Ad Hoc and Sensor Networks and Mobile Computing, Springer
    • Tseng Y.-M., Yang C.-C., and Liao D.-R. A secure group communication protocol for ad hoc wireless networks. Advances in Wireless Ad Hoc and Sensor Networks and Mobile Computing. Book Series Signal and Communication Technology (2007), Springer
    • (2007) Book Series Signal and Communication Technology
    • Tseng, Y.-M.1    Yang, C.-C.2    Liao, D.-R.3
  • 27
    • 84964478812 scopus 로고    scopus 로고
    • Yang, P., Zheng, S., 2001. Security management in hierarchical ad hoc network. In: Proceedings of the 2001 International Conferences on Info-tech and Info-net (ICII), Beijing, China, October, pp. 642-649.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.