메뉴 건너뛰기




Volumn , Issue , 2008, Pages 320-327

The design of a secure key management system for mobile ad hoc networks

Author keywords

Key management; Mobile security; Rekeying; Symmetric cryptography

Indexed keywords

AD HOC NETWORKS; COMPUTER PROGRAMMING LANGUAGES; COMPUTERS; CRYPTOGRAPHY; INTERNET; MANAGEMENT; METROPOLITAN AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK MANAGEMENT; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58049085359     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2008.4664186     Document Type: Conference Paper
Times cited : (7)

References (29)
  • 1
    • 0031142511 scopus 로고    scopus 로고
    • Key derivation for network management applications
    • U. Blumenthal, N. C. Hien, and B. Wijnen, "Key derivation for network management applications", IEEE Network, Vol. 11, pp. 26-29, 1997.
    • (1997) IEEE Network , vol.11 , pp. 26-29
    • Blumenthal, U.1    Hien, N.C.2    Wijnen, B.3
  • 2
    • 33747371642 scopus 로고    scopus 로고
    • Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
    • A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, pp. 1094-1109, 2006.
    • (2006) Performance Evaluation , vol.63 , pp. 1094-1109
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3    Korba, L.4
  • 4
    • 56949106800 scopus 로고    scopus 로고
    • A trust-based security system for ubiquitous and pervasive computing environments
    • A. Boukerche, and Y. Ren, "A trust-based security system for ubiquitous and pervasive computing environments", Computer Communications, 2008.
    • (2008) Computer Communications
    • Boukerche, A.1    Ren, Y.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, Vol. 24, pp. 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 12
    • 4243552572 scopus 로고    scopus 로고
    • Freedom network 1.0 architecture
    • November
    • I. Goldberg, and A. Shostack, "Freedom network 1.0 architecture", November 1999.
    • (1999)
    • Goldberg, I.1    Shostack, A.2
  • 18
    • 35148820142 scopus 로고    scopus 로고
    • On the Performance of a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks
    • K. Lu, and Y. Qian, "On the Performance of a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks", Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1-7, 2006.
    • (2006) Proceedings of IEEE Military Communications Conference (MILCOM) , pp. 1-7
    • Lu, K.1    Qian, Y.2
  • 19
    • 4544385707 scopus 로고    scopus 로고
    • A security design for a general purpose, self-organizing, multihop ad hoc wireless network
    • T. S. Messerges, J. Cukier, and T. A. M. Kevenaar, Eds
    • T. S. Messerges, J. Cukier, and T. A. M. Kevenaar, Eds., "A security design for a general purpose, self-organizing, multihop ad hoc wireless network", Proceedings of 1st ACM workshop on Security of ad hoc and sensor networks, pp. 1-11, 2003.
    • (2003) Proceedings of 1st ACM workshop on Security of ad hoc and sensor networks , pp. 1-11
  • 20
    • 84969528923 scopus 로고    scopus 로고
    • Combinatorial optimization of multicast key management
    • L. Morales, I. H. Sudborough, and M. Eltoweissy, Eds
    • L. Morales, I. H. Sudborough, and M. Eltoweissy, Eds., "Combinatorial optimization of multicast key management", Proceedings of Annual Hawaii International Conference on System Sciences, 2003.
    • (2003) Proceedings of Annual Hawaii International Conference on System Sciences
  • 22
    • 58049111476 scopus 로고    scopus 로고
    • NS-2, available at, Information Sciences Institute, University of Southern California
    • NS-2, available at http://www.isi.edu/nsnam/ns/, Information Sciences Institute, University of Southern California.
  • 24
    • 58049096665 scopus 로고
    • An Analysis of the Simple Network Management Protocol version
    • M. Sc. Thesis, Enschede, University of Twente
    • E. Schekkerman, "An Analysis of the Simple Network Management Protocol version", M. Sc. Thesis, Enschede, University of Twente, 1993.
    • (1993)
    • Schekkerman, E.1
  • 25
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks", IEEE/ACM Transactions on Networking, Vol. 12, pp. 653-666, 2004.
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 26
    • 58049129625 scopus 로고    scopus 로고
    • Symmetric-key algorithm
    • Wikipedia contributors, February
    • Wikipedia contributors, "Symmetric-key algorithm", Wikipedia, The Free Encyclopedia, February, 2008.
    • (2008) Wikipedia, The Free Encyclopedia
  • 27
    • 45849112920 scopus 로고    scopus 로고
    • A Scalable De-centralized Multicast Key Management Scheme
    • Y. Xu, Z. Xu, and X. Chen, Eds, Information and Control, pp
    • Y. Xu, Z. Xu, and X. Chen, Eds., "A Scalable De-centralized Multicast Key Management Scheme", Proceedings of International Conference on Innovative Computing, Information and Control, pp. 463-467, 2006.
    • (2006) Proceedings of International Conference on Innovative Computing , pp. 463-467


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.