메뉴 건너뛰기




Volumn 15, Issue 6, 2007, Pages 1527-1540

Energy and bandwidth-efficient key distribution in wireless Ad Hoc networks: A cross-layer approach

Author keywords

Access control; Ad hoc; Ad hoc networks; Energy conservation; Key distribution; Key management; Multicast communication; Secure group communication; Security

Indexed keywords

ACCESS CONTROL; BANDWIDTH; CRYPTOGRAPHY; ENERGY CONSERVATION; HEURISTIC ALGORITHMS; MULTICASTING; NETWORK SECURITY;

EID: 37549056154     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2007.902696     Document Type: Article
Times cited : (14)

References (27)
  • 1
    • 0036948878 scopus 로고    scopus 로고
    • Minimum-energy broadcast in all-wireless networks: NP-completness and distribution issues
    • presented at the, Atlanta, GA
    • M. Çagalj, J. P. Hubaux, and C. Enz, "Minimum-energy broadcast in all-wireless networks: NP-completness and distribution issues," presented at the ACM Mobile Communications Conf., MOBICOM 2002, Atlanta, GA, 2002.
    • (2002) ACM Mobile Communications Conf., MOBICOM
    • Çagalj, M.1    Hubaux, J.P.2    Enz, C.3
  • 2
    • 0000205020 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • presented at the, Prague, Czech Republic
    • R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," presented at the Eurocrypt'99, Prague, Czech Republic, 1999.
    • (1999) Eurocrypt'99
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 3
    • 37549006081 scopus 로고    scopus 로고
    • A. Clementi, P. Crescenzi, P. Penna, G. Rossi, and P. Vocca, A worstcase analysis of a MST-based heuristic to construct energy-efficient broadcast subtrees in wireless networks, Univ. of Rome Tor Vergata,0 TR 010, 2001 [Online]. Available: http:// www.mat.uniroma2.it/penna/papers/stacs01-TR.ps.gz
    • A. Clementi, P. Crescenzi, P. Penna, G. Rossi, and P. Vocca, "A worstcase analysis of a MST-based heuristic to construct energy-efficient broadcast subtrees in wireless networks," Univ. of Rome Tor Vergata,0 TR 010, 2001 [Online]. Available: http:// www.mat.uniroma2.it/penna/papers/stacs01-TR.ps.gz
  • 4
    • 0001214263 scopus 로고
    • Maximum matching and a polyhedron with (0,1) vertices
    • Jun
    • J. Edmonds, "Maximum matching and a polyhedron with (0,1) vertices," J. Res. National Bureau of Standards, vol. 69B, pp. 125-130, Jun. 1965.
    • (1965) J. Res. National Bureau of Standards , vol.69 B , pp. 125-130
    • Edmonds, J.1
  • 6
    • 84979291225 scopus 로고
    • Advances in Cryptology-Crypto'93, Lecture Notes in Computer Science
    • 80-491
    • A. Fiat and M. Naor, "Broadcast encryption," Advances in Cryptology-Crypto'93, Lecture Notes in Computer Science, vol. 773, pp. 4 80-491, 1994.
    • (1994) , vol.773 , pp. 4
    • Fiat, A.1    Naor, M.2
  • 7
    • 85030568489 scopus 로고
    • Data structures for weighted matching and nearest common ancestors with linking
    • San Francisco, CA, Jan
    • H. Gabow, "Data structures for weighted matching and nearest common ancestors with linking," in Proc. 1st Annu. ACM SIAM Symp. Discrete Algorithms (SODA '90), San Francisco, CA, Jan. 1990, pp. 434-443.
    • (1990) Proc. 1st Annu. ACM SIAM Symp. Discrete Algorithms (SODA '90) , pp. 434-443
    • Gabow, H.1
  • 9
    • 0003037529 scopus 로고
    • Reducibility among combinatorial problems
    • R. Miller and J. Thatcher, Eds. New York: Plenum Press
    • R. M. Karp, "Reducibility among combinatorial problems," in Complexity of Computer Communications, R. Miller and J. Thatcher, Eds. New York: Plenum Press, 1972, pp. 85-103.
    • (1972) Complexity of Computer Communications , pp. 85-103
    • Karp, R.M.1
  • 11
    • 4143085056 scopus 로고    scopus 로고
    • Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
    • Paris, France, May
    • L. Lazos and R. Poovendran, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks," in Proc. IEEE Int. Conf. Communications, ICC 2004, Paris, France, May 2004, pp. 3633-3639.
    • (2004) Proc. IEEE Int. Conf. Communications, ICC 2004 , pp. 3633-3639
    • Lazos, L.1    Poovendran, R.2
  • 12
    • 33845953217 scopus 로고    scopus 로고
    • Power proximity based key management for secure multicast in ad hoc networks
    • Feb
    • L. Lazos and R. Poovendran, "Power proximity based key management for secure multicast in ad hoc networks," ACM/Springer J. Wireless Networks (WINET), vol. 13, no. 1, pp. 127-148, Feb. 2007.
    • (2007) ACM/Springer J. Wireless Networks (WINET) , vol.13 , Issue.1 , pp. 127-148
    • Lazos, L.1    Poovendran, R.2
  • 13
    • 17144418536 scopus 로고    scopus 로고
    • VP3: Using vertex path and power proximity for energy efficient key distribution
    • Los Angeles, CA, Sep
    • L. Lazos, J. Salido, and R. Poovendran, "VP3: Using vertex path and power proximity for energy efficient key distribution," in Proc. IEEE Vehicular Technology Conf., VTC 2004, Los Angeles, CA, Sep. 2004, pp. 1228-1232.
    • (2004) Proc. IEEE Vehicular Technology Conf., VTC 2004 , pp. 1228-1232
    • Lazos, L.1    Salido, J.2    Poovendran, R.3
  • 15
    • 0346627966 scopus 로고    scopus 로고
    • Batch re-keying approach for secure multicast
    • Hong Kong, May
    • X. Li, Y. Yang, M. Gouda, and S. Lam, "Batch re-keying approach for secure multicast," in Proc. World Wide Web 10 (WWW10), Hong Kong, May 2001.
    • (2001) Proc. World Wide Web 10
    • Li, X.1    Yang, Y.2    Gouda, M.3    Lam, S.4
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 18
    • 0035504627 scopus 로고    scopus 로고
    • An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
    • Nov
    • R. Poovendran and J. S. Baras, "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Trans. Inf. Theory, vol. 47, no. 7, pp. 2824-2834, Nov. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.7 , pp. 2824-2834
    • Poovendran, R.1    Baras, J.S.2
  • 19
    • 0033690786 scopus 로고    scopus 로고
    • Kronos: A scalable group re-keying approach for secure multicast
    • Oakland, CA, May
    • S. Setia, S. Koussih, and S. Jajodia, "Kronos: A scalable group re-keying approach for secure multicast," in Proc. IEEE Security and Privacy Symp. 2000, Oakland, CA, May 2000, pp. 215-228.
    • (2000) Proc. IEEE Security and Privacy Symp. 2000 , pp. 215-228
    • Setia, S.1    Koussih, S.2    Jajodia, S.3
  • 20
  • 21
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Aug
    • Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.4 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 22
    • 1642313744 scopus 로고    scopus 로고
    • Metrics useful in network tomography studies
    • Mar
    • Y. Vardi, "Metrics useful in network tomography studies," IEEE Signal Process. Lett., vol. 11, no. 3, pp. 353-355, Mar. 2004.
    • (2004) IEEE Signal Process. Lett , vol.11 , Issue.3 , pp. 353-355
    • Vardi, Y.1
  • 24
    • 0033894011 scopus 로고    scopus 로고
    • On the construction of energy efficient broadcast and multicast trees in wireless networks
    • Mar
    • J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy efficient broadcast and multicast trees in wireless networks," in Proc. IEEE INFOCOM 2000, Mar. 2000, pp. 585-594.
    • (2000) Proc. IEEE INFOCOM 2000 , pp. 585-594
    • Wieselthier, J.E.1    Nguyen, G.D.2    Ephremides, A.3
  • 25
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-31, Feb. 2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1 , pp. 16-31
    • Wong, C.K.1    Gouda, M.2    Lam, S.3
  • 26
    • 0006513010 scopus 로고    scopus 로고
    • Reliable group rekeying: Design and performance analysis
    • presented at the, San Diego, CA, Aug
    • Y. Yang, X. Li, and S. Lam, "Reliable group rekeying: Design and performance analysis," presented at the ACM SIGCOMM, San Diego, CA, Aug. 2001.
    • (2001) ACM SIGCOMM
    • Yang, Y.1    Li, X.2    Lam, S.3
  • 27
    • 0347946946 scopus 로고    scopus 로고
    • Protocol design for scalable and reliable group rekeying
    • Dec
    • X. B. Zhang, S. S. Lam, D. Y. Lee, and Y. R. Yang, "Protocol design for scalable and reliable group rekeying," IEEE/ACM Trans. Networking vol. 11, no. 6, pp. 908-921, Dec. 2003.
    • (2003) IEEE/ACM Trans. Networking , vol.11 , Issue.6 , pp. 908-921
    • Zhang, X.B.1    Lam, S.S.2    Lee, D.Y.3    Yang, Y.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.