A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks*
2006
Journal of Computer Security
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. ...
For the ease of presentation, in this section, we assume that all nodes in an ad hoc network are members of a group. ...
In this paper, we present a scalable and efficient group rekeying protocol (GKMPAN) for ad hoc networks based solely on symmetric key techniques. ...
doi:10.3233/jcs-2006-14401
fatcat:de2vynfu4rhmlgfogzp2shoduy
GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks
The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. ...
For the ease of presentation, in this section, we assume that all nodes in an ad hoc network are members of a group. ...
In this paper, we present a scalable and efficient group rekeying protocol (GKMPAN) for ad hoc networks based solely on symmetric key techniques. ...
doi:10.1109/mobiq.2004.1331709
dblp:conf/mobiquitous/ZhuSXJ04
fatcat:og6diun6krganhm7pbxcxh6z6e
Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks
2015
The Scientific World Journal
In this paper, we propose the mobility based key management technique for multicast security in MANET. ...
In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. ...
They have compared four main existing group key protocols, namely, scalable and efficient group rekeying protocol (GKM-PAN) for ad hoc networks, Distributed Multicast Group Security Architecture (DMGSA ...
doi:10.1155/2015/801632
pmid:25834838
pmcid:PMC4365365
fatcat:qtmvjcfvibcc3gk5kj737tk7ii
Performance Analysis of Secure Group Key Mechanism in Mobile Ad Hoc Networks
2018
International Journal of Engineering & Technology
Security has become a major concern in mobile ad hoc networks. ...
We are using cryptography techniques to provide secure communication in mobile ad hoc networks. To provide security using cryptography, key management is playing a vital role. ...
Ad hoc atmosphere with the mixture of multicast administrations [1] [2] [3] produces security infrastructure. ...
doi:10.14419/ijet.v7i4.10.20932
fatcat:wiaw2tmvl5ebnbwqwvmtnhjwna
Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions
[chapter]
2010
Network Security
Multicast is an efficient technique to distribute data to a large group of users. ...
In recent years, many approaches for scalable group rekeying have been proposed. ...
Group Rekeying in Ad-hoc and Sensor Networks Most of the previous group rekeying schemes were designed for secure multicast communications in the context of wired networks such as IP Multicast. ...
doi:10.1007/978-0-387-73821-5_3
fatcat:in2t5bvv3vgklo7fy2wkjvrlle
A New Group Rekeying Scheme based on t-Packing Designs for Ad Hoc Networks
2007
Proceedings of the 2nd International ICST Conference on Scalable Information Systems
Secure group key distribution and efficient rekeying is one of the most challenging security issues in ad hoc networks at present. ...
The traditional internet style key distribution protocols, for example Kerberos or adapted LKH [1] schemes, are infeasible for ad hoc networks because of their exclusive properties. ...
GKMPAN is an efficient group rekeying scheme for secure multicast in ad-hoc networks proposed by Zhu [10] .GKMPAN also uses the probabilistic key pre-distribution technique as the underlying means to ...
doi:10.4108/infoscale.2007.929
dblp:conf/infoscale/ChenXM07
fatcat:by5hnqllnnezxfgrf7u6jpcakq
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
2008
Journal of Communications
Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. ...
Then based secure key-shared method, the pre-deployed keys are used for implementing secure channels between members for group key distribution. ...
GKMPAN is an efficient group re-keying scheme for secure multicast in ad-hoc networks proposed by Zhu [12] [19] . ...
doi:10.4304/jcm.3.6.51-58
fatcat:qa27q2gsprbnzossununv656mu
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
2007
Electronical Notes in Theoretical Computer Science
Due to its low communication cost, stateful broadcast encryption is an appealing solution for secure content distribution in mobile ad hoc wireless networks (MANETs). ...
We evaluate the performance of our approach through simulation, and show that it achieves good performance for networks with high node density. ...
Acknowledgements The authors would like to thank the anonymous reviewers for helpful comments. The second author was supported by a Bell Labs Graduate Research Fellowship. ...
doi:10.1016/j.entcs.2006.11.009
fatcat:lddmetmyl5crjnec22omsujdz4
REP: Location Privacy for VANETs Using Random Encryption Periods
2009
Journal on spesial topics in mobile networks and applications
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). ...
Keywords VANETs · security · location privacy Introduction Recently vehicular ad-hoc networks (VANETs) have become a hot spot as a promising technology for increasing the efficiency and the safety levels ...
Rongxing Lu for his valuable comments on this work. ...
doi:10.1007/s11036-009-0175-4
fatcat:alwmz7txnvdyrbynlp2g3iwfge
Security Assessment for Key Management in Mobile Ad Hoc Networks
2014
International Journal of Security and Its Applications
Many types of security attacks in ad hoc networks are presented in Section 4. A survey of key management protocols in ad hoc network is presented in Section 5. ...
This paper presents most problems of securing key management in ad hoc networks. It presents a survey of different types of key management protocols in wired networks and in ad hoc networks. ...
A hybrid group key management scheme is proposed for mobile ad hoc network in this paper. In the proposed scheme, an ad hoc network is divided into one control group and number of cluster groups. ...
doi:10.14257/ijsia.2014.8.1.16
fatcat:radpgprvnzcbvemcgogy4kx6dm
A survey of key management in ad hoc networks
2006
IEEE Communications Surveys and Tutorials
This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security. ...
Whereas keymanagement schemes for the upper layers can assume an already running network service, schemes for the protection of the network layer cannot. ...
We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof. ...
doi:10.1109/comst.2006.253271
fatcat:zaobvvfiqzc2jovl7rozpplhxa
Key distribution and update for secure inter-group multicast communication
2005
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05
Group communication has become an important component in wireless networks. ...
In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys. ...
This research is supported in part by NSF ANI 0219110 and NSF IIS 0242840. The authors would also like to thank the seeding fund from ITTC, CERIAS, and CISCO. ...
doi:10.1145/1102219.1102227
dblp:conf/sasn/WangB05
fatcat:filjfs7g75bdrnpa7w6wr5dici
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
2007
Computer Networks
Group communication has become an important component in wireless networks. ...
In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter-group multicast traffic must be protected by secret keys. ...
One possible solution is to adopt a variation of the secure leader election algorithms for ad hoc networks [62] . ...
doi:10.1016/j.comnet.2007.06.001
fatcat:sh5b65fyfbggpbbtlcyzmgp7ui
EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks
2009
IEEE Transactions on Vehicular Technology
It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs). ...
, and vehicular ad hoc and sensor networks. ...
Lu for his valuable comments on this paper. ...
doi:10.1109/tvt.2009.2023662
fatcat:ibq72vwodra4ljhaguuq773age
A Reliable Group Key Management Framework Using Fuzzy Logic for MANETs
2016
International Journal of Intelligent Engineering and Systems
Multicast Routing Multicasting plays significant role in above collaborative applications of ad hoc wireless networks and boost the efficiency of the wireless nodes for communicating the same message to ...
Spontaneous group communication can be attained by deploying Mobile Ad Hoc Networks (or MANETs). ...
Introduction
Mobile Ad Hoc Networks group communication systems and has two important modules called as security and efficiency [7] . ...
doi:10.22266/ijies2016.1231.12
fatcat:uaqgf5djozdizldx22qir5xt4q
« Previous
Showing results 1 — 15 out of 21 results