메뉴 건너뛰기




Volumn 9, Issue 10, 2010, Pages 3072-3081

Securing cluster-based ad hoc networks with distributed authorities

Author keywords

ID based cryptography; key management; mobile ad hoc network; secret sharing; Security

Indexed keywords

CENTRALIZED MANAGEMENT; CERTIFICATE-BASED; CLUSTER-BASED; DISTRIBUTED AUTHORITIES; DYNAMIC NATURE; ID-BASED; ID-BASED CRYPTOGRAPHY; KEY MANAGEMENT; KEY REVOCATION; PUBLIC KEYS; SECRET SHARING; SECURE COMMUNICATIONS; SECURITY; THRESHOLD CRYPTOGRAPHY;

EID: 77957929278     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2010.080610.090759     Document Type: Article
Times cited : (51)

References (51)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS, Springer-Verlag
    • A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology-Crypto 84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
    • (1984) Advances in Cryptology-Crypto 84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing", Advances in Cryptology-Crypto'2001, vol. 2139 of Lecture Notes in Computer Science, pages 21329. Springer-Verlag, 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 49149112756 scopus 로고    scopus 로고
    • Efficient and secure key agreement for merging clusters in ad-hoc networking environments
    • S. Shin and T. Kwon, "Efficient and secure key agreement for merging clusters in ad-hoc networking environments", IEICE Trans. Commun., pp. 1575-1583, vol. E90-B, no. 7, 2007.
    • (2007) IEICE Trans. Commun. , vol.E90-B , Issue.7 , pp. 1575-1583
    • Shin, S.1    Kwon, T.2
  • 4
    • 34247118827 scopus 로고    scopus 로고
    • D-VKT: A scalable distributed key agreement scheme for dynamic collaborative groups
    • DOI 10.1093/ietcom/e90-b.4.750
    • J. Zhang, L. Sun, Y. Tang, and S. Yang, "D-VKT: a scalable distributed key agreement scheme for dynamic collaborative groups", IEICE Trans. vol. 90-B, no. 4, pp. 750-760, 2007. (Pubitemid 46600064)
    • (2007) IEICE Transactions on Communications , vol.E90-B , Issue.4 , pp. 750-760
    • Zhang, J.1    Sun, L.-F.2    Tang, Y.3    Yang, S.-Q.4
  • 5
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network Mag., vol. 13, no. 6, 1999. (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 6
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret", Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 7
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Aug
    • Y. Desmedt and Y. Frankel, "Threshold cryptosystems", CRYPTO 9, pp. 307-315, Aug. 1989.
    • (1989) CRYPTO 9 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 9
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peer-to-peer key management for mobile ad hoc networks
    • DOI 10.1145/1216370.1216371
    • J. van der Merwe, D. Dawoud, and S. McDonald, "A survey on peerto-peer key management for mobile ad hoc networks", ACM Comput. Surveys, vol. 39, no. 1, 2007. (Pubitemid 46572786)
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1216371
    • Van Der Merwe, J.1    Dawoud, D.2    McDonald, S.3
  • 12
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • DOI 10.1109/TNET.2004.838598
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: ubiquitous and robust access control for mobile ad hoc networks", IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004. (Pubitemid 40085372)
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 13
    • 84943517115 scopus 로고    scopus 로고
    • On the unitility of distributed cryptography in P2P and manets: The case of membership control
    • Nov
    • M. Narasimha, G. Tsudik, and J. H. Yi, "On the unitility of distributed cryptography in P2P and manets: the case of membership control", IEEE Int'l Conf. Netw. Protocols, Nov. 2003.
    • (2003) IEEE Int'l Conf. Netw. Protocols
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 15
    • 18244376871 scopus 로고    scopus 로고
    • Efficient and robust key management for large mobile ad hoc networks
    • DOI 10.1016/j.comnet.2004.11.023, PII S1389128604003433
    • B. Zhu et al., "Efficient and robust key management for large mobile ad hoc networks", Comput. Netw., vol. 48, no. 4, pp. 6572, July 2005. (Pubitemid 40626649)
    • (2005) Computer Networks , vol.48 , Issue.4 , pp. 657-682
    • Zhu, B.1    Bao, F.2    Deng, R.H.3    Kankanhalli, M.S.4    Wang, G.5
  • 17
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • DOI 10.1007/s00145-004-0312-y
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman", in Proc. ANTS IV, LNCS 1838, pp. 38594, Springer-Verlag, 2000. (Pubitemid 41201459)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 18
    • 0346265020 scopus 로고    scopus 로고
    • Extending Joux's protocol to multi party key agreement
    • Progress in Cryptology - INDOCRYPT 2003
    • R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement", Indocrypt3, LNCS 2904, pp. 20517, Springer-Verlag, 2003. (Pubitemid 37528723)
    • (2003) Lecture notes in Computer Science , Issue.2904 , pp. 205-217
    • Barua, R.1    Dutta, R.2    Sarkar, P.3
  • 19
    • 35048874197 scopus 로고    scopus 로고
    • Efficient ID-based group key agreement with Bilinear maps
    • Public Key Cryptography - PKC 2004
    • K. Choi, J. Hwang, and D. Lee, "Efficient ID-based group key agreement with bilinear maps", PKC4, LNCS 2947, pp. 13044, Springer-Verlag, 2004. (Pubitemid 38285379)
    • (2004) Lecture Notes in Computer Science , Issue.2947 , pp. 130-144
    • Choi, K.Y.1    Hwang, J.Y.2    Lee, D.H.3
  • 21
    • 77951703530 scopus 로고
    • Cryptanalysis of the Chang-Wu-Chen key distribution system
    • Advances in Cryptology - EUROCRYPT '93
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", Advances Cryptology-EURO-CRYPT4, Lecture Notes Comp. Science, Springer-Verlag, Berlin Germany, 1994. (Pubitemid 24767316)
    • (1994) Lecture Notes in Computer Science , Issue.765 , pp. 440
    • Burmester, M.1
  • 25
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Springer-Verlag, LNCS 2442
    • P. S. L. M. Barreto, H. Y. Kim, and M. Scott, "Efficient algorithms for pairing-based cryptosystems", Advances in Cryptology-Crypto'2002, Springer-Verlag, LNCS 2442, pp. 354-368.
    • Advances in Cryptology-Crypto'2002 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Scott, M.3
  • 26
    • 84986946222 scopus 로고
    • Optimal clustering structures for hierarchicall topological design of large computer networks
    • Fall
    • L. Kleinrock and F. Kamoun, "Optimal clustering structures for hierarchicall topological design of large computer networks", Netw., pp. 221-248, Fall 1980.
    • (1980) Netw. , pp. 221-248
    • Kleinrock, L.1    Kamoun, F.2
  • 27
    • 0032632328 scopus 로고    scopus 로고
    • Optimization algorithms for large self-structuring networks
    • Mar
    • R. Krishnan, R. Ramanathan, and M. Steenstrup, "Optimization algorithms for large self-structuring networks", in Proc. IEEE INFOCOM, pp. 71-78, Mar. 1999.
    • (1999) Proc. IEEE INFOCOM , pp. 71-78
    • Krishnan, R.1    Ramanathan, R.2    Steenstrup, M.3
  • 30
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: how to cope with perpetual leakage", in Proc. CRYPTO 5, pp. 339-352, 1995.
    • (1995) Proc. CRYPTO 5 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 31
    • 24144458508 scopus 로고    scopus 로고
    • A new two-party identity-based authenticated key agreement
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • N. McCullagh and P. S. L. M. Barreto, "A new two-party identity-based authenticated key agreement", Cryptology CT-RSA 2005, Springer-Verlag LNCS 3376, 26274, 2005. (Pubitemid 41231216)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 262-274
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 33
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing", Advances Cryptology-Crypto 91, LNCS 576, 1992, pp. 12940.
    • (1992) Advances Cryptology-Crypto 91, LNCS 576 , pp. 12940
    • Pedersen, T.1
  • 34
    • 3543050471 scopus 로고    scopus 로고
    • Efficient self-healing group key distribution with revocation capability
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • D. Liu, P. Ning, and K. Sun, "Efficient self-healing key distribution with revocation capability", in Proc. 10th ACM Conf. Comput. Commun. Security, pp. 231-240, 2003. (Pubitemid 40673805)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 231-240
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 40
    • 33144479525 scopus 로고    scopus 로고
    • SCAN: Self-organized network-layer security in mobile ad hoc networks
    • DOI 10.1109/JSAC.2005.861384
    • H. Yang, X. Meng, and S. Lu, "Self-organized network layer security in mobile ad hoc networks", First ACM Workshop Wireless Security (WiSe), 2002. (Pubitemid 43269748)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 261-273
    • Yang, H.1    Shu, J.2    Meng, X.3    Lu, S.4
  • 41
    • 77957665398 scopus 로고    scopus 로고
    • Security issues in mobile ad hoc networks - A survey
    • University of Maryland, Baltimore County
    • W. Li and A. Joshi, "Security issues in mobile ad hoc networks-a survey", Dept. Computer Science Electrical Engineering, University of Maryland, Baltimore County.
    • Dept. Computer Science Electrical Engineering
    • Li, W.1    Joshi, A.2
  • 42
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • Fourth Quarter
    • D. Djenouri, L. Khelladi, and A. N. Badache. "A survey of security issues in mobile ad hoc and sensor networks", IEEE Commun. Surveys Tutorials, vol. 7, no. 4, pp. 2-28, Fourth Quarter 2005.
    • (2005) IEEE Commun. Surveys Tutorials , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, A.N.3
  • 43
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Cryptography and Coding
    • S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis", Sixth IMA International Conf. Cryptography Coding, Cirencester, England, 1997. (Pubitemid 128005797)
    • (1997) Lecture Notes in Computer Science , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 45
  • 46
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • T. Imielinski and H. Korth, editors, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks", T. Imielinski and H. Korth, editors, Mobile Computing, vol. 353, pp. 15381, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , vol.353 , pp. 15381
    • Johnson, D.B.1    Maltz, D.A.2
  • 47
    • 33745201299 scopus 로고    scopus 로고
    • Shamus Software Ltd., Online. Available
    • Shamus Software Ltd., "Miracl library." [Online]. Available: http://www.shamus.ie/.
    • Miracl library
  • 48
    • 77957914532 scopus 로고    scopus 로고
    • GNU general public license
    • Online. Available
    • GNU General Public License, "PBC library." [Online]. Available: http://crypto.stanford.edu/pbc/.
    • PBC library
  • 49
    • 77957895140 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2
    • National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.