메뉴 건너뛰기




Volumn 55, Issue 3, 2011, Pages 759-778

A lightweight group-key management protocol for secure ad-hoc-network routing

Author keywords

Ad hoc networks; Group key; Routing; Security

Indexed keywords

AD HOC ENVIRONMENT; AUTHORIZED USERS; CONTROL MESSAGES; CRYPTOGRAPHIC OPERATIONS; GROUP KEY; HIGH AVAILABILITY; HIGH ENERGY CONSUMPTION; KEY AGREEMENT; KEY MANAGEMENT; KEY MANAGEMENT PROTOCOLS; LOW ENERGY CONSUMPTION; NETWORK RESOURCE; OPTIMIZED LINK STATE ROUTING PROTOCOLS; ROUTING; SECURE ROUTING PROTOCOLS; SECURITY; THREE ORDERS OF MAGNITUDE;

EID: 79951510814     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2010.10.003     Document Type: Article
Times cited : (6)

References (43)
  • 4
    • 84948991087 scopus 로고    scopus 로고
    • A secure and efficient conference key distribution system
    • M. Burmester, and Y. Desmedt A secure and efficient conference key distribution system Lecture Notes in Computer Science 950 1998 275 286
    • (1998) Lecture Notes in Computer Science , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 6
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and Approaches for Distributed Sensor Network Security (final)
    • NAI Labs, September
    • D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and Approaches for Distributed Sensor Network Security (final). Tech Report 00-010, NAI Labs, September 2000.
    • (2000) Tech Report 00-010
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 8
    • 2442551009 scopus 로고    scopus 로고
    • Optimized Link State Routing Protocol (OLSR)
    • October
    • T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC 3626, October 2003.
    • (2003) RFC 3626
    • Clausen, T.1    Jacquet, P.2
  • 9
    • 54949092437 scopus 로고    scopus 로고
    • A cooperation-aware routing scheme for fast varying fading wireless channels
    • D.O. Cunha, O.C.M.B. Duarte, and G. Pujolle A cooperation-aware routing scheme for fast varying fading wireless channels IEEE Communications Letters 12 10 2008 794 796
    • (2008) IEEE Communications Letters , vol.12 , Issue.10 , pp. 794-796
    • Cunha, D.O.1    Duarte, O.C.M.B.2    Pujolle, G.3
  • 12
    • 77953320587 scopus 로고    scopus 로고
    • A self-organized mechanism for thwarting malicious access in ad hoc networks
    • San Diego, CA, USA, March
    • N.C. Fernandes, M.D.D. Moreira, O.C.M.B. Duarte, A self-organized mechanism for thwarting malicious access in ad hoc networks, in: 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, March 2010, p. 5.
    • (2010) 2010 Proceedings IEEE INFOCOM , pp. 5
    • Fernandes, N.C.1    Moreira, M.D.D.2    Duarte, O.C.M.B.3
  • 15
    • 79951517407 scopus 로고    scopus 로고
    • IEEE 802.11 Working Group, IEEE standard 802.11-2007, Standard 802.11, IEEE Computer Society, November 2007
    • IEEE 802.11 Working Group, IEEE standard 802.11-2007, Standard 802.11, IEEE Computer Society, November 2007.
  • 17
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, in: Ninth International Conference on Network Protocols (ICNP'01), November 2001, pp. 251-260. (Pubitemid 34099990)
    • (2001) International Conference on Network Protocols , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 18
    • 49049091207 scopus 로고    scopus 로고
    • Cluster-based group key agreement for wireless ad hoc networks
    • Reliability and Security (ARES 08), March
    • E. Konstantinou, Cluster-based group key agreement for wireless ad hoc networks, in: Third International Conference on Availability, Reliability and Security (ARES 08), March 2008, pp. 550-557.
    • (2008) Third International Conference on Availability , pp. 550-557
    • Konstantinou, E.1
  • 19
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • February
    • H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997.
    • (1997) RFC 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 20
    • 66249144693 scopus 로고    scopus 로고
    • Efficient region-based group key agreement protocol for ad hoc networks using elliptic curve cryptography
    • March
    • K. Kumar, V. Sumathy, J.N. Begum, Efficient region-based group key agreement protocol for ad hoc networks using elliptic curve cryptography, in: IEEE International Advance Computing Conference (IACC 2009), March 2009, pp. 1052-1060.
    • (2009) IEEE International Advance Computing Conference (IACC 2009) , pp. 1052-1060
    • Kumar, K.1    Sumathy, V.2    Begum, J.N.3
  • 22
    • 33845953217 scopus 로고    scopus 로고
    • Power proximity based key management for secure multicast in ad hoc networks
    • DOI 10.1007/s11276-006-6057-9
    • L. Lazos, and R. Poovendran Power proximity based key management for secure multicast in ad hoc networks Wireless Network 13 1 2007 127 148 (Pubitemid 46034263)
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 127-148
    • Lazos, L.1    Poovendran, R.2
  • 27
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • DOI 10.1109/TNET.2004.838598
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang URSA: ubiquitous and robust access control for mobile ad hoc networks IEEE/ACM Transactions on Networking 12 6 2004 1049 1063 (Pubitemid 40085372)
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 31
    • 34147173361 scopus 로고    scopus 로고
    • A survey on peer-to-peer key management for mobile ad hoc networks
    • J.V.D. Merwe, D. Dawoud, and S. McDonald A survey on peer-to-peer key management for mobile ad hoc networks ACM Computing Surveys 39 1 2007
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Merwe, J.V.D.1    Dawoud, D.2    McDonald, S.3
  • 33
    • 79951510700 scopus 로고    scopus 로고
    • OpenSSL Core and Development Team April
    • OpenSSL Core and Development Team, OpenSSL - Cryptography and SSL/TLS Toolkit, April 2010, .
    • (2010)
  • 34
    • 0003195066 scopus 로고
    • The MD5 Message-Digest Algorithm
    • April
    • R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, April 1992.
    • (1992) RFC 1321
    • Rivest, R.1
  • 35
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications on ACM 26 1 1983 96 99
    • (1983) Communications on ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 36
    • 33644947393 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES) Key Wrap Algorithm
    • September
    • J. Schaad, R. Housley, Advanced Encryption Standard (AES) Key Wrap Algorithm, RFC 3394, September 2002.
    • (2002) RFC 3394
    • Schaad, J.1    Housley, R.2
  • 43
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • L. Zhou, and Z.J. Haas Securing ad hoc networks IEEE Network 13 6 1999 24 30 (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.