Filters








21 Hits in 2.9 sec

GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks*

Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
2006 Journal of Computer Security  
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks.  ...  For the ease of presentation, in this section, we assume that all nodes in an ad hoc network are members of a group.  ...  In this paper, we present a scalable and efficient group rekeying protocol (GKMPAN) for ad hoc networks based solely on symmetric key techniques.  ... 
doi:10.3233/jcs-2006-14401 fatcat:de2vynfu4rhmlgfogzp2shoduy

GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks

Sencun Zhu, S. Setia, Shouhuai Xu, S. Jajodia
The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.  
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks.  ...  For the ease of presentation, in this section, we assume that all nodes in an ad hoc network are members of a group.  ...  In this paper, we present a scalable and efficient group rekeying protocol (GKMPAN) for ad hoc networks based solely on symmetric key techniques.  ... 
doi:10.1109/mobiq.2004.1331709 dblp:conf/mobiquitous/ZhuSXJ04 fatcat:og6diun6krganhm7pbxcxh6z6e

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

B. Madhusudhanan, S. Chitra, C. Rajan
2015 The Scientific World Journal  
In this paper, we propose the mobility based key management technique for multicast security in MANET.  ...  In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility.  ...  They have compared four main existing group key protocols, namely, scalable and efficient group rekeying protocol (GKM-PAN) for ad hoc networks, Distributed Multicast Group Security Architecture (DMGSA  ... 
doi:10.1155/2015/801632 pmid:25834838 pmcid:PMC4365365 fatcat:qtmvjcfvibcc3gk5kj737tk7ii

Performance Analysis of Secure Group Key Mechanism in Mobile Ad Hoc Networks

Shanmuganthan C, Raviraj P
2018 International Journal of Engineering & Technology  
Security has become a major concern in mobile ad hoc networks.  ...  We are using cryptography techniques to provide secure communication in mobile ad hoc networks. To provide security using cryptography, key management is playing a vital role.  ...  Ad hoc atmosphere with the mixture of multicast administrations [1] [2] [3] produces security infrastructure.  ... 
doi:10.14419/ijet.v7i4.10.20932 fatcat:wiaw2tmvl5ebnbwqwvmtnhjwna

Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions [chapter]

Sencun Zhu, Sushil Jajodia
2010 Network Security  
Multicast is an efficient technique to distribute data to a large group of users.  ...  In recent years, many approaches for scalable group rekeying have been proposed.  ...  Group Rekeying in Ad-hoc and Sensor Networks Most of the previous group rekeying schemes were designed for secure multicast communications in the context of wired networks such as IP Multicast.  ... 
doi:10.1007/978-0-387-73821-5_3 fatcat:in2t5bvv3vgklo7fy2wkjvrlle

A New Group Rekeying Scheme based on t-Packing Designs for Ad Hoc Networks

Jianwei Chen, Li Xu, Yi Mu
2007 Proceedings of the 2nd International ICST Conference on Scalable Information Systems  
Secure group key distribution and efficient rekeying is one of the most challenging security issues in ad hoc networks at present.  ...  The traditional internet style key distribution protocols, for example Kerberos or adapted LKH [1] schemes, are infeasible for ad hoc networks because of their exclusive properties.  ...  GKMPAN is an efficient group rekeying scheme for secure multicast in ad-hoc networks proposed by Zhu [10] .GKMPAN also uses the probabilistic key pre-distribution technique as the underlying means to  ... 
doi:10.4108/infoscale.2007.929 dblp:conf/infoscale/ChenXM07 fatcat:by5hnqllnnezxfgrf7u6jpcakq

Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network

Li Xu, Jianwei Chen, Xiaoding Wang
2008 Journal of Communications  
Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present.  ...  Then based secure key-shared method, the pre-deployed keys are used for implementing secure channels between members for group key distribution.  ...  GKMPAN is an efficient group re-keying scheme for secure multicast in ad-hoc networks proposed by Zhu [12] [19] .  ... 
doi:10.4304/jcm.3.6.51-58 fatcat:qa27q2gsprbnzossununv656mu

A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks

Reza Curtmola, Seny Kamara
2007 Electronical Notes in Theoretical Computer Science  
Due to its low communication cost, stateful broadcast encryption is an appealing solution for secure content distribution in mobile ad hoc wireless networks (MANETs).  ...  We evaluate the performance of our approach through simulation, and show that it achieves good performance for networks with high node density.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for helpful comments. The second author was supported by a Bell Labs Graduate Research Fellowship.  ... 
doi:10.1016/j.entcs.2006.11.009 fatcat:lddmetmyl5crjnec22omsujdz4

REP: Location Privacy for VANETs Using Random Encryption Periods

Albert Wasef, Xuemin (Sherman) Shen
2009 Journal on spesial topics in mobile networks and applications  
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs).  ...  Keywords VANETs · security · location privacy Introduction Recently vehicular ad-hoc networks (VANETs) have become a hot spot as a promising technology for increasing the efficiency and the safety levels  ...  Rongxing Lu for his valuable comments on this work.  ... 
doi:10.1007/s11036-009-0175-4 fatcat:alwmz7txnvdyrbynlp2g3iwfge

Security Assessment for Key Management in Mobile Ad Hoc Networks

Reham Abdellatif Abouhogail
2014 International Journal of Security and Its Applications  
Many types of security attacks in ad hoc networks are presented in Section 4. A survey of key management protocols in ad hoc network is presented in Section 5.  ...  This paper presents most problems of securing key management in ad hoc networks. It presents a survey of different types of key management protocols in wired networks and in ad hoc networks.  ...  A hybrid group key management scheme is proposed for mobile ad hoc network in this paper. In the proposed scheme, an ad hoc network is divided into one control group and number of cluster groups.  ... 
doi:10.14257/ijsia.2014.8.1.16 fatcat:radpgprvnzcbvemcgogy4kx6dm

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security.  ...  Whereas keymanagement schemes for the upper layers can assume an already running network service, schemes for the protection of the network layer cannot.  ...  We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof.  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa

Key distribution and update for secure inter-group multicast communication

Weichao Wang, Bharat Bhargava
2005 Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05  
Group communication has become an important component in wireless networks.  ...  In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys.  ...  This research is supported in part by NSF ANI 0219110 and NSF IIS 0242840. The authors would also like to thank the seeding fund from ITTC, CERIAS, and CISCO.  ... 
doi:10.1145/1102219.1102227 dblp:conf/sasn/WangB05 fatcat:filjfs7g75bdrnpa7w6wr5dici

Stateless key distribution for secure intra and inter-group multicast in mobile wireless network

Weichao Wang, Tylor Stransky
2007 Computer Networks  
Group communication has become an important component in wireless networks.  ...  In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter-group multicast traffic must be protected by secret keys.  ...  One possible solution is to adopt a variation of the secure leader election algorithms for ad hoc networks [62] .  ... 
doi:10.1016/j.comnet.2007.06.001 fatcat:sh5b65fyfbggpbbtlcyzmgp7ui

EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks

A. Wasef, Xuemin Shen
2009 IEEE Transactions on Vehicular Technology  
It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs).  ...  , and vehicular ad hoc and sensor networks.  ...  Lu for his valuable comments on this paper.  ... 
doi:10.1109/tvt.2009.2023662 fatcat:ibq72vwodra4ljhaguuq773age

A Reliable Group Key Management Framework Using Fuzzy Logic for MANETs

G Nagaraja, Pradeep Ch
2016 International Journal of Intelligent Engineering and Systems  
Multicast Routing Multicasting plays significant role in above collaborative applications of ad hoc wireless networks and boost the efficiency of the wireless nodes for communicating the same message to  ...  Spontaneous group communication can be attained by deploying Mobile Ad Hoc Networks (or MANETs).  ...  Introduction Mobile Ad Hoc Networks group communication systems and has two important modules called as security and efficiency [7] .  ... 
doi:10.22266/ijies2016.1231.12 fatcat:uaqgf5djozdizldx22qir5xt4q
« Previous Showing results 1 — 15 out of 21 results