메뉴 건너뛰기




Volumn 8, Issue 4, 2009, Pages 1876-1887

Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks

Author keywords

Ad hoc network; Authentication; Infrastructureless wireless network; Key distribution; Secret sharing; Self healing; Wireless sensor network

Indexed keywords

BROADCAST MESSAGES; FINITE FIELDS; GROUP KEY; GROUP MANAGERS; GROUP USERS; INFRASTRUCTURE-LESS WIRELESS NETWORKS; INFRASTRUCTURELESS WIRELESS NETWORK; KEY DISTRIBUTION; KEY DISTRIBUTION SCHEMES; NETWORK CONDITION; NETWORK INFRASTRUCTURE; SECRET SHARING; SELF-HEALING; SESSION KEY; STORAGE OVERHEAD; UNRELIABLE NETWORK;

EID: 65949120002     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2009.080046     Document Type: Article
Times cited : (28)

References (33)
  • 2
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong M. G. Gouda and S. S. Lam "Secure group communications using key graphs" in Proc. ACM SIGCOMM'98, pp. 68-79, 1998. (Pubitemid 128566448)
    • (1998) Computer Communication Review , vol.28 , Issue.4 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 4
    • 0842267605 scopus 로고    scopus 로고
    • High-speed ECC based kerberos authentication protocol for wireless application
    • in, San Francisco, CA
    • O. M. Erdem "High-speed ECC based kerberos authentication protocol for wireless application" in Proc. IEEE GLOBECOM '03 Commun. Security Symposium, San Francisco, CA, 2003.
    • (2003) Proc. IEEE GLOBECOM '03 Commun. Security Symposium
    • Erdem, O.M.1
  • 5
    • 0035101078 scopus 로고    scopus 로고
    • Toward self-organized mobile ad hoc networks: the Terminodes project
    • and
    • J. P. Hubaux T. Gross J. Y. Le Boudec and M. Vetterli "Toward self-organized mobile ad hoc networks: the Terminodes project" IEEE Commun., vol. 39, no. 1, pp. 118-124, 2001.
    • (2001) IEEE Commun. , vol.39 , Issue.1 , pp. 118-124
    • Hubaux, J.P.1    Gross, T.2    Le Boudec, J.Y.3    Vetterli, M.4
  • 6
    • 34247224664 scopus 로고    scopus 로고
    • Key distribution mechanisms for wireless sensor networks: a survey
    • and, Department of Computer Science, Rensselaer Polytechnic Institute, 512005
    • A. C. Seyit and Y. Bulent "Key distribution mechanisms for wireless sensor networks: a survey" Technical Report TR-05-07 Department of Computer Science, Rensselaer Polytechnic Institute, 512005.
    • Technical Report TR-05-07
    • Seyit, A.C.1    Bulent, Y.2
  • 7
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • DOI 10.1109/TMC.2007.1008
    • Y. Zhou and Y. Fang "A two-layer key establishment scheme for wireless sensor networks" IEEE Trans. Mob. Comp., vol. 6, no. 9, pp. 1009-1020, Sept. 2007. (Pubitemid 47171282)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 8
    • 3042846801 scopus 로고    scopus 로고
    • A secure conference scheme for mobile communications
    • and, Nov
    • X. Yi C. Siew C. Tan and Y. Ye "A secure conference scheme for mobile communications" IEEE Trans. Wireless Commun., vol. 2, no. 6, pp. 1168-1177, Nov. 2003.
    • (2003) IEEE Trans. Wireless Commun. , vol.2 , Issue.6 , pp. 1168-1177
    • Yi, X.1    Siew, C.2    Tan, C.3    Ye, Y.4
  • 9
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission rate
    • and
    • A. Kiayias and M. Yung "Traitor tracing with constant transmission rate" Advances Cryptology-Eurocrypt '02, LNCS, vol. 2332, pp. 450-465, 2002.
    • (2002) Advances Cryptology-Eurocrypt '02, LNCS , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 11
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Financial Cryptography
    • M. Naor and B. Pinkas "Efficient trace and revoke schemes" Financial Cryptography '2000, LNCS, vol. 1962, pp. 1-21, 2000. (Pubitemid 33359593)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 15
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • and, Mar
    • K. Hwang and C. Chang "A self-encryption mechanism for authentication of roaming and teleconference services" IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, Mar. 2003.
    • (2003) IEEE Trans. Wireless Commun. , vol.2 , Issue.2 , pp. 400-407
    • Hwang, K.1    Chang, C.2
  • 17
    • 26444491036 scopus 로고    scopus 로고
    • Efficient self-healing key distribution with revocation capability
    • and, in
    • D. Liu P. Ning and K. Sun "Efficient self-healing key distribution with revocation capability" in Proc. 10th ACM, 2003.
    • (2003) Proc. 10th ACM
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 22
    • 36349017874 scopus 로고    scopus 로고
    • Improved self-healing key distribution with revocation in wireless sensor network
    • DOI 10.1109/WCNC.2007.549, 4204725, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
    • R. Dutta and S. Mukhopadhyay "Improved self-healing key distribution with revocation in wireless sensor network" in Proc. Wireless Commun. Networking Conf., pp. 2963-2968, 2007. (Pubitemid 350139899)
    • (2007) IEEE Wireless Communications and Networking Conference, WCNC , pp. 2965-2970
    • Dutta, R.1    Mukhopadhyay, S.2
  • 24
    • 27644512043 scopus 로고    scopus 로고
    • An efficient key distribution scheme with self-healing properties
    • and
    • T. M. Cover and J. A. Thomas "An efficient key distribution scheme with self-healing properties" IEEE Commun. Lett., vol. 9, pp. 759-761, 2005.
    • (2005) IEEE Commun. Lett. , vol.9 , pp. 759-761
    • Cover, T.M.1    Thomas, J.A.2
  • 25
    • 57049157755 scopus 로고    scopus 로고
    • A self-healing key distribution scheme with novel properties
    • and
    • B. Tian and M. He "A self-healing key distribution scheme with novel properties" International J. Network Security, vol. 7, no. 2, pp. 147-152, 2008.
    • (2008) International J. Network Security , vol.7 , Issue.2 , pp. 147-152
    • Tian, B.1    He, M.2
  • 26
    • 52049095692 scopus 로고    scopus 로고
    • Self-healing group key distribution
    • and
    • M. J. Bohio and A. Miri "Self-healing group key distribution" International J. Network Security, vol. 1, no. 2, pp. 110-117, 2005.
    • (2005) International J. Network Security , vol.1 , Issue.2 , pp. 110-117
    • Bohio, M.J.1    Miri, A.2
  • 27
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
    • Y. Jiang C. Lin M. Shi and X. Shen "Self-healing group key distribution with time-limited node revocation for wireless sensor networks" Ad Hoc Networks, vol. 5, pp. 14-23, 2007. (Pubitemid 44573003)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 28
    • 0003285503 scopus 로고    scopus 로고
    • Group Key Management Protocol (GKMP) specification
    • H. Harney and C. Muckenhirn "Group Key Management Protocol (GKMP) specification" RFC 2093 1997.
    • (1997) RFC , vol.2093
    • Harney, H.1    Muckenhirn, C.2
  • 30
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • and, Sept
    • Y. Jiang C. Lin X. Shen and M. Shi "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks" IEEE Trans. Wireless Commun., vol. 5, no. 19, pp. 2569-2577, Sept. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.19 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 31
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor M. Naor and J. Lotspiech "Revocation and tracing schemes for stateless receivers" Advances Cryptology-Crypto '01, LNCS, vol. 2139, pp. 41-62, 2001. (Pubitemid 33317907)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 32
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • DOI 10.1007/s00145-001-0006-7
    • A. Fiat and T. Tessa "Dynamic traitor tracing" J. Cryptology, vol. 14, pp. 211-223, 2001. (Pubitemid 33770280)
    • (2001) Journal of Cryptology , vol.14 , Issue.3 , pp. 211-223
    • Fiat, A.1
  • 33
    • 65949114720 scopus 로고    scopus 로고
    • Special matrices of mathematical physics: stochastic, circulant and bell matrices
    • in
    • R. Aldrovandi "Special matrices of mathematical physics: stochastic, circulant and bell matrices" in Proc. Singapore: World Scientific, 2001.
    • (2001) Proc. Singapore: World Scientific
    • Aldrovi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.