메뉴 건너뛰기




Volumn 14, Issue 10, 2015, Pages 5552-5564

Energy-Efficient Group Key Agreement for Wireless Networks

Author keywords

Ad hoc wireless networks; public key cryptography; wireless sensor networks

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; ENERGY EFFICIENCY; INFORMATION THEORY; MULTICASTING; POLYNOMIAL APPROXIMATION; PUBLIC KEY CRYPTOGRAPHY; WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 84959262661     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2439675     Document Type: Article
Times cited : (27)

References (44)
  • 1
    • 84893603167 scopus 로고    scopus 로고
    • Energy-efficient, secure group key agreement for ad hoc networks
    • Washington, DC, USA, Oct.
    • T. R. Halford, T. A. Courtade, and K. M. Chugg, "Energy-efficient, secure group key agreement for ad hoc networks," in Proc. IEEE Commun. Netw. Security Conf., Washington, DC, USA, Oct. 2013, pp. 181-188.
    • (2013) Proc. IEEE Commun. Netw. Security Conf. , pp. 181-188
    • Halford, T.R.1    Courtade, T.A.2    Chugg, K.M.3
  • 2
    • 36849063206 scopus 로고    scopus 로고
    • Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
    • Oct.
    • P. Sakarindr and N. Ansari, "Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 8-20, Oct. 2007.
    • (2007) IEEE Wireless Commun. , vol.14 , Issue.5 , pp. 8-20
    • Sakarindr, P.1    Ansari, N.2
  • 3
    • 66149101016 scopus 로고    scopus 로고
    • Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation
    • May
    • K. Ren, W. Lou, B. Zhu, and S. Jajodia, "Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation," IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 2018-2029, May 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.4 , pp. 2018-2029
    • Ren, K.1    Lou, W.2    Zhu, B.3    Jajodia, S.4
  • 4
    • 84897708272 scopus 로고    scopus 로고
    • Secure many-to-some communications
    • San Diego, CA, USA, Nov.
    • T. R. Halford, "Secure many-to-some communications," in Proc. IEEE Mil. Commyn. Conf., San Diego, CA, USA, Nov. 2013, pp. 243-247.
    • (2013) Proc. IEEE Mil. Commyn. Conf. , pp. 243-247
    • Halford, T.R.1
  • 6
    • 0033894011 scopus 로고    scopus 로고
    • On the construction of energy-efficient broadcast and multicast trees in wireless networks
    • Tel Aviv, Israel, Mar.
    • J. E.Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy-efficient broadcast and multicast trees in wireless networks," in Proc. IEEE Conf. Comput. Commun., Tel Aviv, Israel, Mar. 2000, pp. 585-594.
    • (2000) Proc. IEEE Conf. Comput. Commun. , pp. 585-594
    • Wieselthier, J.E.1    Nguyen, G.D.2    Ephremides, A.3
  • 11
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 12
    • 0000288916 scopus 로고
    • A secure and efficient conference key distribution system
    • Berlin, Germany: Springer-Verlag, ser. Lecture Notes in Computer Science
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," in Advances in Cryptology - EUROCRYPT, vol. 950. Berlin, Germany: Springer-Verlag, 1995, pp. 275-286, ser. Lecture Notes in Computer Science.
    • (1995) Advances in Cryptology - EUROCRYPT , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 13
    • 84861147805 scopus 로고    scopus 로고
    • ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing
    • Jul./Aug.
    • J.-W. Ho, M. Wright, and S. K. Das, "ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing," IEEE Trans. Dependable Secure Comput., vol. 9, no. 4, pp. 494-511, Jul./Aug. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.4 , pp. 494-511
    • Ho, J.-W.1    Wright, M.2    Das, S.K.3
  • 14
    • 84893441364 scopus 로고    scopus 로고
    • Coded cooperative data exchange in multihop networks
    • Feb.
    • T. A. Courtade and R. D. Wesel, "Coded cooperative data exchange in multihop networks," IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1136-1158, Feb. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.2 , pp. 1136-1158
    • Courtade, T.A.1    Wesel, R.D.2
  • 15
    • 84906536511 scopus 로고    scopus 로고
    • Coded cooperative data exchange for a secrect key
    • Honolulu, HI, USA, Jul.
    • T. A. Courtade and T. R. Halford, "Coded cooperative data exchange for a secrect key," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 776-780.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 776-780
    • Courtade, T.A.1    Halford, T.R.2
  • 16
    • 84908655314 scopus 로고    scopus 로고
    • Group key management protocols for secure mobile multicast communication: A comprehensive survey
    • Dec.
    • T. T. Mapoka, "Group key management protocols for secure mobile multicast communication: A comprehensive survey," Int. J. Comput. Appl., vol. 84, no. 12, pp. 28-38, Dec. 2013.
    • (2013) Int. J. Comput. Appl. , vol.84 , Issue.12 , pp. 28-38
    • Mapoka, T.T.1
  • 17
    • 32444434566 scopus 로고    scopus 로고
    • An efficient group key agreement protocol
    • Feb.
    • B. E. Jung, "An efficient group key agreement protocol," IEEE Commun. Lett., vol. 10, no. 2, pp. 106-107, Feb. 2006.
    • (2006) IEEE Commun. Lett. , vol.10 , Issue.2 , pp. 106-107
    • Jung, B.E.1
  • 18
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 19
    • 83655191085 scopus 로고    scopus 로고
    • Linear perfect secret key agreement
    • Paraty, Brazil, Oct.
    • C. Chan, "Linear perfect secret key agreement," in Proc. IEEE Inf. Theory Workshop, Paraty, Brazil, Oct. 2011, pp. 723-726.
    • (2011) Proc. IEEE Inf. Theory Workshop , pp. 723-726
    • Chan, C.1
  • 20
    • 84906536499 scopus 로고    scopus 로고
    • On the communication complexity of secret key generation in the multiterminal source model
    • Honolulu, HI, USA, Jul.
    • M. Mukherjee and N. Kashyap, "On the communication complexity of secret key generation in the multiterminal source model," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 1151-1155.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 1151-1155
    • Mukherjee, M.1    Kashyap, N.2
  • 21
    • 78649383176 scopus 로고    scopus 로고
    • Perfect omniscience, perfect secrecy and Steiner tree packing
    • Dec.
    • S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy and Steiner tree packing," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.12 , pp. 6490-6500
    • Nitinawarat, S.1    Narayan, P.2
  • 22
    • 84882989241 scopus 로고    scopus 로고
    • Common information and secret key capacity
    • Sep.
    • H. Tyagi, "Common information and secret key capacity," IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5627-5640, Sep. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5627-5640
    • Tyagi, H.1
  • 23
    • 78649346776 scopus 로고    scopus 로고
    • Secret key generation for a pairwise independent network model
    • Dec.
    • S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6482-6489, Dec. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.12 , pp. 6482-6489
    • Nitinawarat, S.1    Ye, C.2    Barg, A.3    Narayan, P.4    Reznik, A.5
  • 25
    • 0022793132 scopus 로고
    • How to construct random functions
    • Oct.
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. ACM, vol. 33, no. 4, pp. 792-807, Oct. 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 27
    • 84867506651 scopus 로고    scopus 로고
    • Coded cooperative data exchange problem for general topologies
    • Cambridge, MA, USA, Jul.
    • M. Gonen and M. Langberg, "Coded cooperative data exchange problem for general topologies," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 2606-2610.
    • (2012) Proc. IEEE Int. Symp. Inf. Theory , pp. 2606-2610
    • Gonen, M.1    Langberg, M.2
  • 28
    • 84856078259 scopus 로고    scopus 로고
    • Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both
    • Monticello, IL, USA, Sep.
    • T. A. Courtade and R. D. Wesel, "Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both," in Proc. Allerton Conf. Commun., Control, Comput., Monticello, IL, USA, Sep. 2011, pp. 1349-1357.
    • (2011) Proc. Allerton Conf. Commun., Control, Comput. , pp. 1349-1357
    • Courtade, T.A.1    Wesel, R.D.2
  • 29
    • 0041663475 scopus 로고    scopus 로고
    • Opportunistic large arrays: Cooperative transmission in wireless multihop ad hoc networks to reach far distances
    • Aug.
    • A. Scaglione and Y.-W. Hong, "Opportunistic large arrays: Cooperative transmission in wireless multihop ad hoc networks to reach far distances," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2082-2092, Aug. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.8 , pp. 2082-2092
    • Scaglione, A.1    Hong, Y.-W.2
  • 33
    • 0034449805 scopus 로고    scopus 로고
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • Athens, Greece, Nov.
    • Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. ACM Conf. Comput. Commun. Security, Athens, Greece, Nov. 2000, pp. 235-244.
    • (2000) Proc. ACM Conf. Comput. Commun. Security , pp. 235-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 35
    • 84884861701 scopus 로고    scopus 로고
    • Pairwise and triple key distribution in wireless sensor networks with applications
    • Nov.
    • S. Ruj, A. Nayak, and I. Stojmenovic, "Pairwise and triple key distribution in wireless sensor networks with applications," IEEE Trans. Comput., vol. 62, no. 11, pp. 2224-2237, Nov. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.11 , pp. 2224-2237
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 36
    • 15844381309 scopus 로고
    • A probabilistic analysis of the set covering problem
    • C. Vercellis, "A probabilistic analysis of the set covering problem," Ann. Oper. Res., vol. 1, no. 3, pp. 255-271, 1984.
    • (1984) Ann. Oper. Res. , vol.1 , Issue.3 , pp. 255-271
    • Vercellis, C.1
  • 37
    • 15844399700 scopus 로고    scopus 로고
    • Absolute o(logm) error in approximating random set cover: An average case analysis
    • May
    • O. A. Telelis and V. Zissimopoulos, "Absolute o(logm) error in approximating random set cover: An average case analysis," Inf. Process. Lett., vol. 94, no. 4, pp. 171-177, May 2005.
    • (2005) Inf. Process. Lett. , vol.94 , Issue.4 , pp. 171-177
    • Telelis, O.A.1    Zissimopoulos, V.2
  • 38
    • 85030178366 scopus 로고
    • Epidemic algorithms for replicated database maintenance
    • Vancouver, BC, Canada, Aug.
    • A. Demers et al., "Epidemic algorithms for replicated database maintenance," in Proc. ACM Symp. Principles Distrib. Comput., Vancouver, BC, Canada, Aug. 1987, pp. 1-12.
    • (1987) Proc. ACM Symp. Principles Distrib. Comput. , pp. 1-12
    • Demers, A.1
  • 39
    • 79951643202 scopus 로고    scopus 로고
    • A low complexity distributed algorithm for computing minimum-depth multicast trees in wireless networks
    • San Jose, CA, USA, Nov.
    • A. S. Akyurek and E. Uysal-Biyikoglu, "A low complexity distributed algorithm for computing minimum-depth multicast trees in wireless networks," in Proc. IEEE Mil. Commun. Conf., San Jose, CA, USA, Nov. 2010, pp. 1918-1923.
    • (2010) Proc. IEEE Mil. Commun. Conf. , pp. 1918-1923
    • Akyurek, A.S.1    Uysal-Biyikoglu, E.2
  • 41
    • 0001553129 scopus 로고    scopus 로고
    • Critical power for asymptotic connectivity in wireless networks
    • Boston, MA, USA: Birkhaüser
    • P. Gupta and P. R. Kumar, "Critical power for asymptotic connectivity in wireless networks," in Stochastic Analysis, Control, Optimization and Applications. Boston, MA, USA: Birkhaüser, 1998, pp. 547-566.
    • (1998) Stochastic Analysis, Control, Optimization and Applications , pp. 547-566
    • Gupta, P.1    Kumar, P.R.2
  • 42
    • 56449087483 scopus 로고    scopus 로고
    • Energy conservation in wireless sensor networks: A survey
    • May
    • G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: A survey," Ad Hoc Netw., vol. 7, no. 3, pp. 537-568, May 2009.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.3 , pp. 537-568
    • Anastasi, G.1    Conti, M.2    Di Francesco, M.3    Passarella, A.4
  • 44
    • 83355173279 scopus 로고    scopus 로고
    • A note on 'Algorithms for connected set cover problem and fault-tolerant connected set cover problem'
    • Oct.
    • W. Ren and Q. Zhao, "A note on 'Algorithms for connected set cover problem and fault-tolerant connected set cover problem'," Theor. Comput. Sci., vol. 412, no. 45, pp. 6451-6454, Oct. 2011.
    • (2011) Theor. Comput. Sci. , vol.412 , Issue.45 , pp. 6451-6454
    • Ren, W.1    Zhao, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.