메뉴 건너뛰기




Volumn 6, Issue 4, 2008, Pages 560-577

A secure group key management scheme for hierarchical mobile ad hoc networks

Author keywords

Ad hoc network; Group key management; Hierarchy; Many to many group communication; Security

Indexed keywords

HIERARCHICAL SYSTEMS; MOBILE DEVICES; PROBLEM SOLVING;

EID: 39149132135     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.04.006     Document Type: Article
Times cited : (47)

References (37)
  • 2
    • 84907551158 scopus 로고    scopus 로고
    • G. Pei, M. Gerla, X. Hong, C.-C. Chi, A Wireless Hierarchical Routing Protocol with Group Mobility, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 1999, pp. 1538-1542.
    • G. Pei, M. Gerla, X. Hong, C.-C. Chi, A Wireless Hierarchical Routing Protocol with Group Mobility, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 1999, pp. 1538-1542.
  • 3
    • 0032092244 scopus 로고    scopus 로고
    • Hierarchically-Organized, Multihop Mobile Wireless Networks for Quality-of-Service Support
    • Ramanathan R., and Steenstrup M. Hierarchically-Organized, Multihop Mobile Wireless Networks for Quality-of-Service Support. Mobile Networks and Applications 3 1 (1998) 101-119
    • (1998) Mobile Networks and Applications , vol.3 , Issue.1 , pp. 101-119
    • Ramanathan, R.1    Steenstrup, M.2
  • 4
    • 0035392857 scopus 로고    scopus 로고
    • A Survey of Energy Efficient Network Protocols for Wireless Networks
    • Jones C.E., Sivalingam K.M., Agrawal P., and Chen J.C. A Survey of Energy Efficient Network Protocols for Wireless Networks. Wirel. Netw. 7 4 (2001) 343-358
    • (2001) Wirel. Netw. , vol.7 , Issue.4 , pp. 343-358
    • Jones, C.E.1    Sivalingam, K.M.2    Agrawal, P.3    Chen, J.C.4
  • 5
    • 0000893747 scopus 로고
    • Neuer Beweis eines Satzes ueber Permutationen
    • Prüfer H. Neuer Beweis eines Satzes ueber Permutationen. Archiv für Mathematik und Physik 27 (1918) 742-744
    • (1918) Archiv für Mathematik und Physik , vol.27 , pp. 742-744
    • Prüfer, H.1
  • 7
    • 0345565893 scopus 로고    scopus 로고
    • A Survey of Key Management for Secure Group Communication
    • Rafaeli S., and Hutchison D. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35 3 (2003) 309-329
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 8
    • 0034449805 scopus 로고    scopus 로고
    • Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 235-244.
    • Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 235-244.
  • 10
    • 84978999296 scopus 로고    scopus 로고
    • Efficient and Secure Conference-key Distribution
    • Springer-Verlag, Cambridge, UK
    • Burmester M., and Desmedt Y. Efficient and Secure Conference-key Distribution. Proceedings of the Security Protocols Workshop (1996), Springer-Verlag, Cambridge, UK 119-129
    • (1996) Proceedings of the Security Protocols Workshop , pp. 119-129
    • Burmester, M.1    Desmedt, Y.2
  • 11
    • 0038318530 scopus 로고    scopus 로고
    • An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups
    • National Institute of Standards and Technology, National Computer Security Center, Baltimore, MD, USA
    • Alves-Foss J. An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups. Proceedings of 23rd National Information Systerms Security Conference (NISSC) (2000), National Institute of Standards and Technology, National Computer Security Center, Baltimore, MD, USA 254-266
    • (2000) Proceedings of 23rd National Information Systerms Security Conference (NISSC) , pp. 254-266
    • Alves-Foss, J.1
  • 12
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • EUROCRYPT'84, Springer-Verlag, Paris, France
    • Blom R. An Optimal Class of Symmetric Key Generation Systems. EUROCRYPT'84. Lecture Notes in Computer Science Vol. 209 (1985), Springer-Verlag, Paris, France 335-338
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • Blom, R.1
  • 14
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • CRYPTO'93, Springer-Verlag New York, Inc., Santa Barbara, California, United States
    • Fiat A., and Naor M. Broadcast Encryption. CRYPTO'93. Lecture Notes in Computer Science Vol. 773 (1994), Springer-Verlag New York, Inc., Santa Barbara, California, United States 480-491
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 15
    • 39149130543 scopus 로고    scopus 로고
    • T. Ballardie, Scalable Multicast Key Distribution, RFC 1949, 1996. .
    • T. Ballardie, Scalable Multicast Key Distribution, RFC 1949, 1996. .
  • 17
    • 39149098315 scopus 로고    scopus 로고
    • H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094.
    • H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094.
  • 18
    • 39149085221 scopus 로고    scopus 로고
    • S. Mittra, A Framework for Scalable Secure Multicasting, in: Proceedings of ACM SIGCOMM, 1997, pp. 277-288.
    • S. Mittra, A Framework for Scalable Secure Multicasting, in: Proceedings of ACM SIGCOMM, 1997, pp. 277-288.
  • 20
    • 0038043478 scopus 로고    scopus 로고
    • Key Establishment in Large Dynamic Groups Using One-Way Function Trees
    • Sherman A.T., and McGrew D.A. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Transactions on Software Engineering 29 5 (2003) 444-458
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 22
    • 39149103592 scopus 로고    scopus 로고
    • D.M. Wallner, E.J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627.
    • D.M. Wallner, E.J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627.
  • 23
    • 14544302192 scopus 로고    scopus 로고
    • A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication
    • Huang D., and Medhi D. A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication. ACM Transactions on Information and System Security 7 4 (2004) 523-552
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 523-552
    • Huang, D.1    Medhi, D.2
  • 24
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A Key-management Scheme for Distributed Sensor Networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02), 2002, pp. 41-47.
    • L. Eschenauer, V.D. Gligor, A Key-management Scheme for Distributed Sensor Networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02), 2002, pp. 41-47.
  • 25
    • 28444433009 scopus 로고    scopus 로고
    • Random Key Predistribution Schemes for Sensor Networks
    • IEEE Computer Society, Los Alamitos, CA
    • Chan H., Perrig A., and Song D. Random Key Predistribution Schemes for Sensor Networks. Proceedings of 2003 Symposium on Security and Privacy (2003), IEEE Computer Society, Los Alamitos, CA 197-215
    • (2003) Proceedings of 2003 Symposium on Security and Privacy , pp. 197-215
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 27
    • 3142739563 scopus 로고    scopus 로고
    • An Architecture for Key Management in Hierarchical Mobile Ad-Hoc Networks
    • Rhee K., Park Y., and Tsudik G. An Architecture for Key Management in Hierarchical Mobile Ad-Hoc Networks. Journal of Communications and Networks 6 2 (2004) 156-162
    • (2004) Journal of Communications and Networks , vol.6 , Issue.2 , pp. 156-162
    • Rhee, K.1    Park, Y.2    Tsudik, G.3
  • 29
    • 39149134452 scopus 로고    scopus 로고
    • D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Tech. rep., MITRE Corporation (1976).
    • D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Tech. rep., MITRE Corporation (1976).
  • 32
    • 39149132685 scopus 로고    scopus 로고
    • R.G. Ogier, F.L. Templin, M.G. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), IETF Internet RFC 3684.
    • R.G. Ogier, F.L. Templin, M.G. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), IETF Internet RFC 3684.
  • 34
    • 11244265545 scopus 로고    scopus 로고
    • Almost Optimal Hash Sequence Traversal
    • InterVarsity Press, Southampton, Bermuda
    • Coppersmith D., and Jakobsson M. Almost Optimal Hash Sequence Traversal. Proceedings of the Finacial Cryptography (2002), InterVarsity Press, Southampton, Bermuda 102-119
    • (2002) Proceedings of the Finacial Cryptography , pp. 102-119
    • Coppersmith, D.1    Jakobsson, M.2
  • 35
    • 0036352143 scopus 로고    scopus 로고
    • M. Jakobsson, Fractal Hash Sequence Representation and Traversal, in: Proceedings of the IEEE International Symposium on Information Theory (ISIT'02), 2002, pp. 437-444.
    • M. Jakobsson, Fractal Hash Sequence Representation and Traversal, in: Proceedings of the IEEE International Symposium on Information Theory (ISIT'02), 2002, pp. 437-444.
  • 36
    • 84863090748 scopus 로고
    • Steiner Tree Problems
    • Hwang F.K., and Richards D.S. Steiner Tree Problems. Networks 22 (1992) 55-89
    • (1992) Networks , vol.22 , pp. 55-89
    • Hwang, F.K.1    Richards, D.S.2
  • 37
    • 0030263992 scopus 로고    scopus 로고
    • Efficient Solutions to Multicast Routing in Communication Networks
    • Makki K., Pissinou N., and Frieder O. Efficient Solutions to Multicast Routing in Communication Networks. Mobile Networks and Applications 1 2 (1996) 221-232
    • (1996) Mobile Networks and Applications , vol.1 , Issue.2 , pp. 221-232
    • Makki, K.1    Pissinou, N.2    Frieder, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.