메뉴 건너뛰기




Volumn 24, Issue 8, 2018, Pages 3009-3027

Host mobility key management in dynamic secure group communication

Author keywords

Group communication; Group key management; Host mobility; Secure group communication

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS;

EID: 85018341784     PISSN: 10220038     EISSN: 15728196     Source Type: Journal    
DOI: 10.1007/s11276-017-1511-4     Document Type: Article
Times cited : (14)

References (68)
  • 3
    • 84875668050 scopus 로고    scopus 로고
    • Video multicast over WLANs: Power saving and reliability perspectives
    • Shin, Y., Choi, M., Koo, J., & Choi, S. (2013). Video multicast over WLANs: Power saving and reliability perspectives. Network IEEE, 27(2), 40–46. doi:10.1109/MNET.2013.6485095
    • (2013) Network IEEE , vol.27 , Issue.2 , pp. 40-46
    • Shin, Y.1    Choi, M.2    Koo, J.3    Choi, S.4
  • 4
    • 79958760133 scopus 로고    scopus 로고
    • Mobile application market: A developer’s perspective
    • Holzer, A., & Ondrus, J. (2011). Mobile application market: A developer’s perspective. Telematics and Informatics, 28(1), 22–31. doi:10.1016/j.tele.2010.05.006
    • (2011) Telematics and Informatics , vol.28 , Issue.1 , pp. 22-31
    • Holzer, A.1    Ondrus, J.2
  • 6
    • 0025430666 scopus 로고
    • Multicast routing in datagram internetworks and extended LANs
    • Deering, S. E., & Cheriton, D. R. (1990). Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems, 8(2), 85–110. doi:10.1145/78952.78953
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.2 , pp. 85-110
    • Deering, S.E.1    Cheriton, D.R.2
  • 7
    • 85054322631 scopus 로고    scopus 로고
    • Accessed 15 Aug 2016
    • Cisco Systems (2012). Internet protocol multicast. http://docwiki.cisco.com/wiki/Internet_Protocol_Multicast. Accessed 15 Aug 2016
    • (2012) Internet Protocol Multicast
  • 8
    • 36849063206 scopus 로고    scopus 로고
    • Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
    • Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. Wireless Communications IEEE, 14(5), 8–20. doi:10.1109/mwc.2007.4396938
    • (2007) Wireless Communications IEEE , vol.14 , Issue.5 , pp. 8-20
    • Sakarindr, P.1    Ansari, N.2
  • 9
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: a survey
    • Judge, P., & Ammar, M. (2003). Security issues and solutions in multicast content distribution: a survey. Network IEEE, 17(1), 30–36. doi:10.1109/mnet.2003.1174175
    • (2003) Network IEEE , vol.17 , Issue.1 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 13
    • 34548827597 scopus 로고    scopus 로고
    • A study of different types of attacks on multicast in mobile ad hoc networks
    • Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46
    • (2008) Ad Hoc Networks , vol.6 , Issue.1 , pp. 32-46
    • Nguyen, H.L.1    Nguyen, U.T.2
  • 16
    • 3242657408 scopus 로고    scopus 로고
    • Group key agreement efficient in communication
    • Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905–921
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.7 , pp. 905-921
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 18
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 19
    • 78650326704 scopus 로고    scopus 로고
    • Survey of security services on group communications
    • Sakarindr, P., & Ansari, N. (2010). Survey of security services on group communications. Information Security IET, 4(4), 258–272. doi:10.1049/iet-ifs.2009.0261
    • (2010) Information Security IET , vol.4 , Issue.4 , pp. 258-272
    • Sakarindr, P.1    Ansari, N.2
  • 20
    • 84921033454 scopus 로고    scopus 로고
    • Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
    • Daghighi, B., Mat Kiah, M. L., Shamshirband, S., & Rehman, M. H. U. (2015). Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications, 50, 1–14. doi:10.1016/j.jnca.2014.11.001
    • (2015) Journal of Network and Computer Applications , vol.50 , pp. 1-14
    • Daghighi, B.1    Mat Kiah, M.L.2    Shamshirband, S.3    Rehman, M.H.U.4
  • 24
    • 52249114327 scopus 로고    scopus 로고
    • Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
    • IEEE Computer Society
    • Mat Kiah, M. L., & Martin, K. M. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In Proceedings of the future generation communication and networking 2007 (Vol. 01, pp. 100–107): IEEE Computer Society. doi:10.1109/FGCN.2007.144
    • Proceedings of the Future Generation Communication and Networking 2007 , vol.1 , pp. 100-107
    • Mat Kiah, M.L.1    Martin, K.M.2
  • 25
    • 15744371024 scopus 로고    scopus 로고
    • SAKM: A scalable and adaptive key management approach for multicast communications
    • Challal, Y., Bettahar, H., & Bouabdallah, A. (2004). SAKM: A scalable and adaptive key management approach for multicast communications. ACM SIGCOMM Computer Communication Review, 34(2), 55–70. doi:10.1145/997150.997157
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.2 , pp. 55-70
    • Challal, Y.1    Bettahar, H.2    Bouabdallah, A.3
  • 26
    • 2942564655 scopus 로고    scopus 로고
    • A scalable and distributed multicast security protocol using a subgroup-key hierarchy
    • Heba, K. A. (2004). A scalable and distributed multicast security protocol using a subgroup-key hierarchy. Computers and Security, 23(4), 320–329. doi:10.1016/j.cose.2003.11.003
    • (2004) Computers and Security , vol.23 , Issue.4 , pp. 320-329
    • Heba, K.A.1
  • 29
    • 82155172863 scopus 로고    scopus 로고
    • Mobility management for IP-based next generation mobile networks: Review, challenge and perspective
    • Al-Surmi, I., Othman, M., & Mohd Ali, B. (2012). Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. Journal of Network and Computer Applications, 35(1), 295–315. doi:10.1016/j.jnca.2011.09.001
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.1 , pp. 295-315
    • Al-Surmi, I.1    Othman, M.2    Mohd Ali, B.3
  • 30
    • 84936971520 scopus 로고    scopus 로고
    • Key management paradigm for mobile secure group communications: Issues, solutions, and challenges
    • Daghighi, B., Mat Kiah, M. L., Shamshirband, S., Iqbal, S., & Asghari, P. (2015). Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Computer Communications, 72, 1–16. doi:10.1016/j.comcom.2015.05.008
    • (2015) Computer Communications , vol.72 , pp. 1-16
    • Daghighi, B.1    Mat Kiah, M.L.2    Shamshirband, S.3    Iqbal, S.4    Asghari, P.5
  • 33
    • 37549056155 scopus 로고    scopus 로고
    • Hierarchical group access control for secure multicast communications
    • Yan, S., & Liu, K. J. R. (2007). Hierarchical group access control for secure multicast communications. Networking IEEE/ACM Transactions on, 15(6), 1514–1526
    • (2007) Networking IEEE/ACM Transactions on , vol.15 , Issue.6 , pp. 1514-1526
    • Yan, S.1    Liu, K.J.R.2
  • 34
    • 34147147912 scopus 로고    scopus 로고
    • Dynamic balanced key tree management for secure Multicast communications
    • Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007). Dynamic balanced key tree management for secure Multicast communications. Computers IEEE Transactions on, 56(5), 590–605
    • (2007) Computers IEEE Transactions on , vol.56 , Issue.5 , pp. 590-605
    • Ng, W.H.D.1    Howarth, M.2    Sun, Z.3    Cruickshank, H.4
  • 35
    • 54349088694 scopus 로고    scopus 로고
    • Secure and efficient group key management with shared key derivation
    • Lin, J. C., Huang, K. H., Lai, F., & Lee, H. C. (2009). Secure and efficient group key management with shared key derivation. Computer Standards and Interfaces, 31(1), 192–208
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 192-208
    • Lin, J.C.1    Huang, K.H.2    Lai, F.3    Lee, H.C.4
  • 36
    • 72549116358 scopus 로고    scopus 로고
    • Computation-and-storage-efficient key tree management protocol for secure multicast communications
    • Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33(2), 136–148. doi:10.1016/j.comcom.2009.08.007
    • (2010) Computer Communications , vol.33 , Issue.2 , pp. 136-148
    • Je, D.-H.1    Lee, J.-S.2    Park, Y.3    Seo, S.-W.4
  • 39
    • 33749609746 scopus 로고    scopus 로고
    • A communication-computation efficient group key algorithm for large and dynamic groups
    • Zheng, S., Manz, D., & Alves-Foss, J. (2007). A communication-computation efficient group key algorithm for large and dynamic groups. Computer Networks, 51(1), 69–93. doi:10.1016/j.comnet.2006.03.008
    • (2007) Computer Networks , vol.51 , Issue.1 , pp. 69-93
    • Zheng, S.1    Manz, D.2    Alves-Foss, J.3
  • 40
    • 51849155543 scopus 로고    scopus 로고
    • Notes on the CRTDH Group Key Agreement Protocol
    • Paper presented at the Distributed Computing Systems Workshops, 2008. ICDCS ‘08
    • Magliveras, S., Wandi, W., & Xukai, Z. (2008). Notes on the CRTDH Group Key Agreement Protocol. Paper presented at the Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on
    • (2008) 28Th International Conference On
    • Magliveras, S.1    Wandi, W.2    Xukai, Z.3
  • 41
    • 77958458851 scopus 로고    scopus 로고
    • Efficient cluster-based group key agreement protocols for wireless ad hoc networks
    • Konstantinou, E. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384–393
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 384-393
    • Konstantinou, E.1
  • 42
    • 84865071791 scopus 로고    scopus 로고
    • Group key agreement for secure group communication in dynamic peer systems
    • Lv, X., Li, H., & Wang, B. (2012). Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing, 72(10), 1195–1200. doi:10.1016/j.jpdc.2012.06.004
    • (2012) Journal of Parallel and Distributed Computing , vol.72 , Issue.10 , pp. 1195-1200
    • Lv, X.1    Li, H.2    Wang, B.3
  • 44
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Mittra, S. (1997). Iolus: A framework for scalable secure multicasting. SIGCOMM Computer Communication Review, 27(4), 277–288
    • (1997) SIGCOMM Computer Communication Review , vol.27 , Issue.4 , pp. 277-288
    • Mittra, S.1
  • 45
    • 34848843875 scopus 로고    scopus 로고
    • A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    • Nemaney Pour, A., Kumekawa, K., Kato, T., & Itoh, S. (2007). A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Computer Networks, 51(17), 4727–4743. doi:10.1016/j.comnet.2007.07.007
    • (2007) Computer Networks , vol.51 , Issue.17 , pp. 4727-4743
    • Nemaney Pour, A.1    Kumekawa, K.2    Kato, T.3    Itoh, S.4
  • 46
    • 40849124634 scopus 로고    scopus 로고
    • Performance optimization of region-based group key management in mobile ad hoc networks
    • Cho, J.-H., Chen, I.-R., & Wang, D.-C. (2008). Performance optimization of region-based group key management in mobile ad hoc networks. Performance Evaluation, 65(5), 319–344. doi:10.1016/j.peva.2007.07.002
    • (2008) Performance Evaluation , vol.65 , Issue.5 , pp. 319-344
    • Cho, J.-H.1    Chen, I.-R.2    Wang, D.-C.3
  • 47
    • 46849100481 scopus 로고    scopus 로고
    • A scalable key management and clustering scheme for wireless ad hoc and sensor networks
    • Li, J. H., Bhattacharjee, B., Yu, M., & Levy, R. (2008). A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems, 24(8), 860–869. doi:10.1016/j.future.2008.03.007
    • (2008) Future Generation Computer Systems , vol.24 , Issue.8 , pp. 860-869
    • Li, J.H.1    Bhattacharjee, B.2    Yu, M.3    Levy, R.4
  • 49
    • 77956577652 scopus 로고    scopus 로고
    • A decentralized multi-group key management scheme
    • Hur, J., & Yoon, H. (2009). A decentralized multi-group key management scheme. IEICE Transactions on Communications, 92, 632–635
    • (2009) IEICE Transactions on Communications , vol.92 , pp. 632-635
    • Hur, J.1    Yoon, H.2
  • 50
    • 84899501069 scopus 로고    scopus 로고
    • Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks
    • Mehdizadeh, A., Hashim, F., & Othman, M. (2014). Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks. Journal of Network and Computer Applications, 42, 59–69. doi:10.1016/j.jnca.2014.03.013
    • (2014) Journal of Network and Computer Applications , vol.42 , pp. 59-69
    • Mehdizadeh, A.1    Hashim, F.2    Othman, M.3
  • 51
    • 33847181724 scopus 로고    scopus 로고
    • Random waypoint mobility model in cellular networks
    • Hyytiä, E., & Virtamo, J. (2007). Random waypoint mobility model in cellular networks. Wireless Networks, 13(2), 177–188. doi:10.1007/s11276-006-4600-3
    • (2007) Wireless Networks , vol.13 , Issue.2 , pp. 177-188
    • Hyytiä, E.1    Virtamo, J.2
  • 52
    • 84937520339 scopus 로고    scopus 로고
    • Community aware heterogeneous human mobility (CAHM): Model and analysis
    • Narmawala, Z., & Srivastava, S. (2015). Community aware heterogeneous human mobility (CAHM): Model and analysis. Pervasive and Mobile Computing, 21, 119–132. doi:10.1016/j.pmcj.2014.12.008
    • (2015) Pervasive and Mobile Computing , vol.21 , pp. 119-132
    • Narmawala, Z.1    Srivastava, S.2
  • 53
    • 85007387458 scopus 로고    scopus 로고
    • The value strength aided information diffusion in socially-aware mobile networks
    • Wang, J., Jiang, C., Quek, T. Q. S., Wang, X., & Ren, Y. (2016). The value strength aided information diffusion in socially-aware mobile networks. IEEE Access, 4, 3907–3919. doi:10.1109/ACCESS.2016.2600526
    • (2016) IEEE Access , vol.4 , pp. 3907-3919
    • Wang, J.1    Jiang, C.2    Quek, T.Q.S.3    Wang, X.4    Ren, Y.5
  • 54
    • 84922900595 scopus 로고    scopus 로고
    • Mining personal data using smartphones and wearable devices: A survey
    • Habib ur Rahman, M., Liew, C. S., Wah, T. Y., Shuja, J., & Daghighi, B. (2015). Mining personal data using smartphones and wearable devices: A survey. Sensors, 15(2), 4430–4469
    • (2015) Sensors , vol.15 , Issue.2 , pp. 4430-4469
    • Habib ur Rahman, M.1    Liew, C.S.2    Wah, T.Y.3    Shuja, J.4    Daghighi, B.5
  • 55
    • 32644441025 scopus 로고    scopus 로고
    • Scalable key management for secure multicast communication in the mobile environment
    • Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187–203
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.2 , pp. 187-203
    • Cao, J.1    Liao, L.2    Wang, G.3
  • 58
    • 0038391332 scopus 로고    scopus 로고
    • Kamat, S., Parimi, S., & Agrawal, D. P. Reduction in control overhead for a secure, scalable framework for mobile multicast. In, 2003 (Vol. 1, pp. 98–103 vol. 101): IEEE
    • Kamat, S.1    Parimi, S.2    Agrawal, D.P.3
  • 62
    • 0031383381 scopus 로고    scopus 로고
    • A reliable multicast framework for light-weight sessions and application level framing
    • Floyd, S., Jacobson, V., Liu, C.-G., McCanne, S., & Zhang, L. (1997). A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, 5(6), 784–803. doi:10.1109/90.650139
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 784-803
    • Floyd, S.1    Jacobson, V.2    Liu, C.-G.3    McCanne, S.4    Zhang, L.5
  • 66
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the Internet’s multicast backbone (MBone)
    • Almeroth, K. C., & Ammar, M. H. (1997). Multicast group behavior in the Internet’s multicast backbone (MBone). Communications Magazine IEEE, 35(6), 124–129
    • (1997) Communications Magazine IEEE , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.C.1    Ammar, M.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.