메뉴 건너뛰기




Volumn 58, Issue 1, 2009, Pages 398-408

A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: The key management study

Author keywords

Group oriented computing; Key management; Mobile ad hoc network (MANET); Multicast; Pyramidal security model

Indexed keywords

ACCESS CONTROL; APPLICATIONS; GRAPH THEORY; MOBILE AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; MULTICASTING; NETWORK MANAGEMENT; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS; TREES (MATHEMATICS); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 59649092949     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2008.923666     Document Type: Article
Times cited : (37)

References (19)
  • 1
    • 0037250696 scopus 로고    scopus 로고
    • Multicast over wireless mobile ad hoc networks: Present and future directions
    • Jan./Feb
    • C. de Morais Cordeiro, H. Gossain, and P. Agrawal, "Multicast over wireless mobile ad hoc networks: Present and future directions," IEEE Netw., vol. 17, no. 1, pp. 52-59, Jan./Feb. 2003.
    • (2003) IEEE Netw , vol.17 , Issue.1 , pp. 52-59
    • de Morais Cordeiro, C.1    Gossain, H.2    Agrawal, P.3
  • 2
    • 0344875666 scopus 로고    scopus 로고
    • Family ACK tree (FAT): Supporting reliable multicast in mobile ad hoc networks
    • Nov
    • W. Liao and M.-Y. Jiang, "Family ACK tree (FAT): Supporting reliable multicast in mobile ad hoc networks," IEEE Trans. Veh. Technol., vol. 52, no. 6, pp. 1675-1685, Nov. 2003.
    • (2003) IEEE Trans. Veh. Technol , vol.52 , Issue.6 , pp. 1675-1685
    • Liao, W.1    Jiang, M.-Y.2
  • 3
    • 0033748607 scopus 로고    scopus 로고
    • New multi-party authentication services and key agreement protocols
    • Apr
    • G. Ateniese, M. Steiner, and G. Tsudik, "New multi-party authentication services and key agreement protocols," IEEE J. Sel. Areas Commun. vol. 18, no. 4, pp. 628-639, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 5
    • 0034449805 scopus 로고    scopus 로고
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • Nov
    • Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. ACM Conf. Comput. Commun. Security, Nov. 2000, pp. 235-244.
    • (2000) Proc. ACM Conf. Comput. Commun. Security , pp. 235-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 7
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • Nov
    • D. R. Stinson, "On some methods for unconditionally secure key distribution and broadcast encryption," Designs, Codes Cryptogr., vol. 2, no. 3, pp. 215-243, Nov. 1997.
    • (1997) Designs, Codes Cryptogr , vol.2 , Issue.3 , pp. 215-243
    • Stinson, D.R.1
  • 8
    • 0034238689 scopus 로고    scopus 로고
    • Key management for restricted multicast using broadcast encryption
    • Aug
    • M. Abdalla, Y. Shavitt, and A. Wool, "Key management for restricted multicast using broadcast encryption," IEEE/ACM Trans. Netw., vol. 8, no. 4, pp. 443-454, Aug. 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.4 , pp. 443-454
    • Abdalla, M.1    Shavitt, Y.2    Wool, A.3
  • 10
    • 0033893174 scopus 로고    scopus 로고
    • Security group communication using key graph
    • Feb
    • C. K. Wong, M. Gouda, and S. S. Lam, "Security group communication using key graph," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 11
    • 0035504627 scopus 로고    scopus 로고
    • An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
    • Nov
    • R. Poovendran and J. S. Baras, "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Trans. Inf. Theory, vol. 47, no. 7, pp. 2824-2834, Nov. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.7 , pp. 2824-2834
    • Poovendran, R.1    Baras, J.S.2
  • 12
    • 0036505660 scopus 로고    scopus 로고
    • Design of secure multicast key management schemes with communication budget constraint
    • Mar
    • M. Li, R. Poovendran, and C. Berenstein, "Design of secure multicast key management schemes with communication budget constraint," IEEE Commun. Lett., vol. 6, no. 3, pp. 108-110, Mar. 2002.
    • (2002) IEEE Commun. Lett , vol.6 , Issue.3 , pp. 108-110
    • Li, M.1    Poovendran, R.2    Berenstein, C.3
  • 13
    • 1342347276 scopus 로고    scopus 로고
    • Dynamics of key management in secure satellite multicast
    • Feb
    • M. P. Howarth, S. Iyengar, Z. Sun, and H. Cruickshank, "Dynamics of key management in secure satellite multicast," IEEE J. Sel. Areas Commun., vol. 22, no. 2, pp. 308-319, Feb. 2004.
    • (2004) IEEE J. Sel. Areas Commun , vol.22 , Issue.2 , pp. 308-319
    • Howarth, M.P.1    Iyengar, S.2    Sun, Z.3    Cruickshank, H.4
  • 14
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Aug
    • Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 653-666, Aug. 2004.
    • (2004) IEEE/ACM Trans. Netw , vol.12 , Issue.4 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 15
    • 19644372958 scopus 로고    scopus 로고
    • Optimizing the tree structure in secure multicast key management
    • May
    • W. T. Zhu, "Optimizing the tree structure in secure multicast key management," IEEE Commun. Lett., vol. 9, no. 5, pp. 477-479, May 2005.
    • (2005) IEEE Commun. Lett , vol.9 , Issue.5 , pp. 477-479
    • Zhu, W.T.1
  • 16
    • 1142305219 scopus 로고    scopus 로고
    • Algorithms for dynamic multicast key distribution trees
    • J. Goshi and R. E. Ladner, "Algorithms for dynamic multicast key distribution trees," in Proc. 22nd Annu. Symp. PODC, 2003, pp. 243-251.
    • (2003) Proc. 22nd Annu. Symp. PODC , pp. 243-251
    • Goshi, J.1    Ladner, R.E.2
  • 17
    • 14844363629 scopus 로고    scopus 로고
    • A novel high-order tree for secure multicast key management
    • Feb
    • H. Lu, "A novel high-order tree for secure multicast key management," IEEE Trans. Comput., vol. 54, no. 2, pp. 214-224, Feb. 2005.
    • (2005) IEEE Trans. Comput , vol.54 , Issue.2 , pp. 214-224
    • Lu, H.1
  • 18
    • 36849062175 scopus 로고    scopus 로고
    • Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
    • Oct
    • M. Shi, Y. Jiang, X. Shen, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 38-46, Oct. 2007.
    • (2007) IEEE Wireless Commun , vol.14 , Issue.5 , pp. 38-46
    • Shi, M.1    Jiang, Y.2    Shen, X.3    Lin, C.4
  • 19
    • 33748600970 scopus 로고    scopus 로고
    • Multiple key sharing and distribution scheme with (n, t) threshold mechanism for NEMO group communications
    • Sep
    • Y. Jiang, C. Lin, M. Shi, and X. Shen, "Multiple key sharing and distribution scheme with (n, t) threshold mechanism for NEMO group communications," IEEE J. Sel. Areas Commun., vol. 24, no. 9, pp. 1738-1747, Sep. 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.9 , pp. 1738-1747
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.