메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A hierarchical identity based key management scheme in tactical mobile Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ALLOCATION ALGORITHM; DYNAMIC NATURE; ENERGY STATE; HIERARCHICAL KEY MANAGEMENT SCHEME; IDENTITY-BASED; KEY MANAGEMENT; NETWORK LIFETIME; NETWORK STRUCTURES; NODE-STATE; PARENT NODE; PRIVATE KEY GENERATORS; SIMULATION RESULT;

EID: 77951489959     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2009.5379731     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 47949101717 scopus 로고    scopus 로고
    • Key refreshing in identity-based cryptography and its applications in MANETs
    • Orlando, FL, USA, Oct.
    • S. Balfe, K. D. Boklan, Z. Klagsbrun, and K. G. Paterson, "Key refreshing in identity-based cryptography and its applications in MANETs," in Proc. IEEE MILCOM 2007, (Orlando, FL, USA), Oct. 2007.
    • (2007) Proc. IEEE MILCOM 2007
    • Balfe, S.1    Boklan, K.D.2    Klagsbrun, Z.3    Paterson, K.G.4
  • 2
    • 0000244582 scopus 로고
    • Threshold cryptosystems
    • Santa Barbara, CA, USA, Aug.
    • Y. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. CRYPTO'89, (Santa Barbara, CA, USA), Aug. 1989.
    • (1989) Proc. CRYPTO'89
    • Desmedt, Y.1    Frankel, Y.2
  • 3
    • 0036267543 scopus 로고    scopus 로고
    • A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks
    • G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai., "A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks," Comput. J., vol.45, no.3, pp. 293-303, 2002.
    • (2002) Comput. J. , vol.45 , Issue.3 , pp. 293-303
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 4
    • 33947173113 scopus 로고    scopus 로고
    • A hierarchical key predistribution scheme
    • Lincoln, NE, USA, May.
    • M. Ramkumar, N. Memon, and R. Simha, "A hierarchical key predistribution scheme," in Proc. EIT'05, (Lincoln, NE, USA), May. 2005.
    • (2005) Proc. EIT'05
    • Ramkumar, M.1    Memon, N.2    Simha, R.3
  • 5
    • 85008033660 scopus 로고    scopus 로고
    • Strongly-resilient and non-interactive hierarchical keyagreement in MANETs
    • Berlin, Heidelberg, Springer-Verlag
    • R. Gennaro, S. Halevi, H. Krawczyk, T. Rabin, S. Reidt, and S. D. Wolthusen, "Strongly-resilient and non-interactive hierarchical keyagreement in MANETs," in Proc. ESORICS '08, (Berlin, Heidelberg), Springer-Verlag, 2008.
    • (2008) Proc. ESORICS '08
    • Gennaro, R.1    Halevi, S.2    Krawczyk, H.3    Rabin, T.4    Reidt, S.5    Wolthusen, S.D.6
  • 7
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb.
    • A. Mishra, K. Nadkarni, , and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Comm., vol.11, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Comm. , vol.11 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 8
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • Dec.
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Netw., vol.12, pp. 1049-1063, Dec. 2004.
    • (2004) IEEE/ACM Trans. Netw. , vol.12 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 9
    • 35248862545 scopus 로고    scopus 로고
    • The hmm-based modeling for the energy level prediction in wireless sensor networks
    • Harbin, P.R. China, May
    • P. Hu, Z. Zhou, Q. Liu, and F. Li, "The hmm-based modeling for the energy level prediction in wireless sensor networks," in Proc. IEEE 2nd Conf. on Industrial Electronics and Applications, (Harbin, P.R. China), pp. 2253-2258, May 2007.
    • (2007) Proc. IEEE 2nd Conf. on Industrial Electronics and Applications , pp. 2253-2258
    • Hu, P.1    Zhou, Z.2    Liu, Q.3    Li, F.4
  • 10
    • 34247874478 scopus 로고    scopus 로고
    • Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach
    • Y. Chen, Q. Zhao, and V. Krishnamurthy, "Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach," IEEE Trans. Signal Proc., vol.55, no.5, pp. 2294-2309, 2007.
    • (2007) IEEE Trans. Signal Proc. , vol.55 , Issue.5 , pp. 2294-2309
    • Chen, Y.1    Zhao, Q.2    Krishnamurthy, V.3
  • 11
    • 0343441515 scopus 로고    scopus 로고
    • Restless bandits, linear programming relaxations, and a primal dual index heuristic
    • D. Berstimas and J. Nino-Mora, "Restless bandits, linear programming relaxations, and a primal dual index heuristic," Operations Research, vol.48, no.1, pp. 80-90, 2000.
    • (2000) Operations Research , vol.48 , Issue.1 , pp. 80-90
    • Berstimas, D.1    Nino-Mora, J.2
  • 12
  • 13
    • 3543079858 scopus 로고    scopus 로고
    • Optimizing the scalability of network intrusion detection systems using mobile agents
    • D. G. Marks, P. Mell, and M. Stinson, "Optimizing the scalability of network intrusion detection systems using mobile agents," J. Netw. Syst. Manage., vol.12, no.1, pp. 95-110, 2004.
    • (2004) J. Netw. Syst. Manage. , vol.12 , Issue.1 , pp. 95-110
    • Marks, D.G.1    Mell, P.2    Stinson, M.3
  • 14
    • 3042546547 scopus 로고    scopus 로고
    • Threshold and identitybased key management and authentication for wireless ad hoc networks
    • Washington, DC, USA, Apr.
    • H. Deng, A. Mukherjee, and D. Agrawal, "Threshold and identitybased key management and authentication for wireless ad hoc networks," in Proc. ITCC'04, (Washington, DC, USA), Apr. 2004.
    • (2004) Proc. ITCC'04
    • Deng, H.1    Mukherjee, A.2    Agrawal, D.3
  • 15
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • Jan.
    • X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective key management scheme for heterogeneous sensor networks," Elsevier Ad Hoc Networks, vol.5, pp. 24-34, Jan. 2007.
    • (2007) Elsevier Ad Hoc Networks , vol.5 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.