메뉴 건너뛰기




Volumn 37, Issue 1-3, 2008, Pages 29-36

An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks

Author keywords

Ad hoc networks security; Density function; Group key management; Multicast communication

Indexed keywords

AUTHENTICATION; BASE STATIONS; MULTICASTING; NETWORK SECURITY; PROBABILITY DENSITY FUNCTION; PUBLIC KEY CRYPTOGRAPHY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 43149092240     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-008-9074-4     Document Type: Article
Times cited : (9)

References (53)
  • 7
    • 15744371024 scopus 로고    scopus 로고
    • SAKM: A scalable and adaptive key management approach for multicast communications
    • Challal, Y., et al. (2004). SAKM: A scalable and adaptive key management approach for multicast communications. In ACM SIGCOMM computer communications review.
    • (2004) ACM SIGCOMM Computer Communications Review
    • Challal, Y.1
  • 8
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for secure multicast
    • 5
    • Chan, K.-C., & Chan, S.-H.G. (2003). Key management approaches to offer data confidentiality for secure multicast. IEEE Journal on Network, 17(5), 30-39.
    • (2003) IEEE Journal on Network , vol.17 , pp. 30-39
    • Chan, K.-C.1    Chan, S.-H.G.2
  • 12
    • 0742294233 scopus 로고    scopus 로고
    • Ad hoc networking: Imperatives and challenges
    • Chlamtac, I., Conti, M., & Liu, J. (2003). Ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1, 13-64.
    • (2003) Ad Hoc Networks , vol.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2    Liu, J.3
  • 17
    • 20544465992 scopus 로고    scopus 로고
    • An overview of security issues for multihop mobile ad hoc networks
    • ISBN:0-931695-25-3
    • Ghosh, T., et al. (2004). An overview of security issues for multihop mobile ad hoc networks. In Technology advances, strategies, and change drivers. ISBN:0-931695-25-3.
    • (2004) Technology Advances, Strategies, and Change Drivers
    • Ghosh, T.1
  • 18
    • 4143065848 scopus 로고    scopus 로고
    • A secure on-demand routing protocol for ad hoc networks
    • Georgia, USA
    • Hu, Y., et al. (2002). A secure on-demand routing protocol for ad hoc networks. In ACM MOBICOM, Georgia, USA.
    • (2002) ACM MOBICOM
    • Hu, Y.1
  • 19
    • 1842693650 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • USA
    • Hu, Y., et al. (2002). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE INFOCOM, USA.
    • (2002) IEEE INFOCOM
    • Hu, Y.1
  • 23
    • 0035577649 scopus 로고    scopus 로고
    • Moving from security to distributed trust in ubiquitous computing environments
    • 12
    • Kagal, L., Finin, T., & Joshi, A. (2001). Moving from security to distributed trust in ubiquitous computing environments. IEEE Computer, 34(12), 154-157.
    • (2001) IEEE Computer , vol.34 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 24
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad hoc networks
    • 3
    • Komninos, N., Vergados, D., & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), 289-298.
    • (2007) Ad Hoc Networks , vol.5 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 37
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafeali, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 309-329.
    • (2003) ACM Computing Surveys (CSUR) , pp. 309-329
    • Rafeali, S.1    Hutchison, D.2
  • 41
    • 0003198066 scopus 로고    scopus 로고
    • Kronos: A scalable group re-keying approach for secure multicast
    • Setia, S., et al. (2000). Kronos: A scalable group re-keying approach for secure multicast. In IEEE symposium on security and privacy.
    • (2000) IEEE Symposium on Security and Privacy
    • Setia, S.1
  • 46
    • 34547743395 scopus 로고    scopus 로고
    • A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    • 10
    • Wang, N.-C., & Fang, S.-Z. (2007). A hierarchical key management scheme for secure group communications in mobile ad hoc networks. The Journal of Systems and Softwar, 80(10), 1667-1677.
    • (2007) The Journal of Systems and Softwar , vol.80 , pp. 1667-1677
    • Wang, N.-C.1    Fang, S.-Z.2
  • 48
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc networks: Challenges and solutions
    • February 2004
    • Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in Mobile Ad Hoc networks: challenges and solutions. In IEEE wireless communications (pp. 38-47). February 2004.
    • (2004) IEEE Wireless Communications , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 49
    • 0035020319 scopus 로고    scopus 로고
    • Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks
    • USA
    • Yu, F., & Leung, V. C. M. (2001). Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks. IEEE INFOCOM, USA (pp. 518-526).
    • (2001) IEEE INFOCOM , pp. 518-526
    • Yu, F.1    Leung, V.C.M.2
  • 53
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • 6
    • Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network, 13(6), 24-30.
    • (1999) IEEE Network , vol.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.