7,924 Hits in 3.9 sec

Energy efficient CBMT for secure multicast key distribution in mobile ad hoc networks

D. Suganyadevi, G. Padmavathi
2010 Procedia Computer Science  
In many multicast interactions, a new member can join, a current member can leave at any time and existing members must communicate securely using multicast key distribution within constrained energy for  ...  It also reduces end to end delay in multicast transmission.  ...  for secure multicast communication.  ... 
doi:10.1016/j.procs.2010.11.032 fatcat:h7vpjw2tczajze3astenjx3key

Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey

Trust TshepoMapoka
2013 International Journal of Computer Applications  
With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile  ...  Key management is widely being adopted in securing group communication for both wired and wireless networks.  ...  Key Tree in Mobile Multicast (KTMM): Authors of [21] propose two Key management protocols suitable for securing group communications in mobile multicast.  ... 
doi:10.5120/14629-2985 fatcat:egbeggvigjg6vh6dzzko3ishb4

Secure Multicast Key Distribution for Mobile Ad Hoc Networks [article]

D. SuganyaDevi, G.Padmavathi
2010 arXiv   pre-print
Thus this paper shows the specific challenges towards multicast key management protocols for securing multicast key distribution in mobile ad hoc networks, and present relevant multicast key management  ...  In many multicast interactions, new member can join and current members can leave at any time and existing members must communicate securely using multicast key distribution within constrained energy for  ...  This paper extends and presents taxonomy of multicast key distribution protocols, dedicated to operate in ad hoc networks for secure multicast communications.  ... 
arXiv:1003.1799v1 fatcat:5gcy3vdnybhcfpuydjrfzcimra

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet [chapter]

Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao
2005 Lecture Notes in Computer Science  
This paper describes a secure multicast infrastructure for large-scale group communications in Mobile Internet and proposes a key management protocol based on the infrastructure.  ...  The multicast communication domain is logically divided into several administrative areas with a key server associated with each area.  ...  We propose a secure multicast infrastructure for large-scale group communications, and propose a key management protocol based on the infrastructure.  ... 
doi:10.1007/11534310_60 fatcat:dziozm3zrfh2jlxztwugrp4jdu

Secure multicast groups on ad hoc networks

T. Kaya, G. Lin, G. Noubir, A. Yilmaz
2003 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03  
The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source.  ...  We also proposed an extension to the basic secure multicast tree using multi-link capability combined with a k-out-of-N coding approach.  ...  We propose a set of protocols that use locality to reduce the communication complexity of secure multicast for dynamic groups of mobile multihop nodes.  ... 
doi:10.1145/986858.986872 dblp:conf/sasn/KayaLNY03 fatcat:5tri2jishre57kgpfkcowj2kbi

CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement

Elina Eidkhani
2012 International Journal of Computer Networks & Communications  
However, for successful deployment, security and efficiency of content delivery must be provided at first. This paper presents a new approach for secure multicast in wireless networks.  ...  This approach, CRAW (Combination of Re-keying and Authentication in Wireless networks) combines member authentication procedure with group key management protocol to provide an efficient group re-keying  ...  However, in [18] [19] [20] new re-keying protocols for secure wireless multicast communications have been proposed.  ... 
doi:10.5121/ijcnc.2012.4407 fatcat:4lcakg3aizfpvmqvwocqoxoy5e

A survey of ring-building network protocols suitable for command and control group communications

Ahmed Sobeih, William Yurcik, Edward M. Carapezza
2005 Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV  
constant and independent of the size of the multicast group; this significantly reduces the complexity in, for example, the key distribution mechanism, (2) Reliable and totally-ordered message delivery  ...  Multicasting is the enabling technology for group communication.  ...  VRing Totem SecureRing Spread Secure Transis Adaptive Spread Real-Time Group Multicast Ring Distributed Distributed Distributed Distributed Distributed Distributed Distributed Management  ... 
doi:10.1117/12.604204 fatcat:ecrompt4tfh3zf7lzpmzgi4cta


2012 International Journal of Smart Sensor and Adhoc Network.  
The authentication must be done without much delay and should independent of the other packets. In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks.  ...  The proposed batch verification scheme as a part of the protocol poses a significant reduction within the message delay, then by using shared key process so requirement of the storage management is extremely  ...  In multicast communication, a group key is given to every authorized member. This group key is used by the sender as a symmetric key to encipher the multicast traffic.  ... 
doi:10.47893/ijssan.2012.1144 fatcat:n7syrf5dn5bwjimz5r3u4t5lly

An Approach for Secure Mobile Ad Hoc Networks: Key Management and Routing

Hridya V Deva raj, Jinu Mohan
2016 International Journal of Innovative Research in Computer and Communication Engineering  
Secure communication between two nodes in a network depends on reliable key management systems that generates and distributes keys between the communicating nodes and a secure routing protocol that establishes  ...  Security protocols for MANET's can be categorized in two major categories: Prevention: This mechanism involves protocols which prohibits the attacking node to initiate any action.  ...  Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes  ... 
doi:10.15680/ijircce.2016.0407007 fatcat:oegnbkbsanembbh2mxov5gm2v4

A Survey on Group Key Management Schemes

R. Seetha, R. Saravanan
2015 Cybernetics and Information Technologies  
Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes.  ...  The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.  ...  Moreover, the key management follows a set of cryptographic techniques in generating and distributing the keys which may be symmetric or asymmetric for secure group communication.  ... 
doi:10.1515/cait-2015-0038 fatcat:qhbtuqohyfd4hooxvixqouz6iy

Secure multicast in various scenarios of WirelessMAN

Sen Xu, Chin-tser Huang, Manton Matthews
2007 Proceedings 2007 IEEE SoutheastCon  
Multicast is also supported in IEEE 802.16, and a Multicast and Broadcast Rekeying Algorithm (MBRA) is proposed as an optional function for secure multicast.  ...  We also propose algorithms for secure multicast in different scenarios of WirelessMAN besides its basic scheme.  ...  Encryption of group messages and selective distribution of the keys used for encryption is the primary method for ensuring the security.  ... 
doi:10.1109/secon.2007.342992 fatcat:aanicfk3jfd7th7uoqq7vzgini

A Survey on Multicasting in Software-Defined Networking

Salekul Islam, Nasif Muslim, J. William Atwood
2018 IEEE Communications Surveys and Tutorials  
We then present a survey of existing and proposed approaches to security for IP multicast and SDN multicast.  ...  We present a survey of existing multicast routing protocols in IP multicast, and a survey of existing and proposed multicast routing algorithms in SDN multicast.  ...  ACKNOWLEDGMENTS Support for Salekul Islam was provided in part by United International University (UIU), through its UIU Research Grant program. Support for J.  ... 
doi:10.1109/comst.2017.2776213 fatcat:4me7qfrjgnhthifholvkwl3s24

Impact of Mobility for Qos Based Secure Manet

D Suganya Devi, G Padmavathi
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution for mobile adhoc networks.  ...  Secure multicast communication in Mobile Adhoc Networks (MANETs) is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, limited resources  ...  The Key management [5] includes creating, distributing and updating the keys then it constitutes a basic block for secure multicast communication applications.  ... 
doi:10.5121/jgraphoc.2010.2304 fatcat:lrthmvsukjdo3fvlz7wcqpeiyq

A secure and lightweight multicast communication system for Smart Grids

Tiago Rizzetti, Bolívar Menezes da Silva, Alexandre Silva Rodrigues, Rafael Gressler Milbradt, Luciane Neves Canha
2018 EAI Endorsed Transactions on Security and Safety  
In the Smart Grids context, all communications must be handled in a secure way, including multicast traffic.  ...  The results show that this approach is lightweight, secure, and assures multicast message delivery, even on failures caused by attacks on the key distribution system.  ...  To avoid it was created a secure protocol based on PKI to assure key distribution without vulnerabilities with known attacks.  ... 
doi:10.4108/eai.13-7-2018.156004 fatcat:geidjmzgnjbvjakkbaqnyaii5a

Multimedia security in group communications: recent progress in key management, authentication, and watermarking

Ahmet M. Eskicioglu
2003 Multimedia Systems  
Multicast security includes group membership control, secure key distribution, secure data transfer and copyright protection.  ...  This makes multicast an ideal technology for communication among a large group of participants.  ...  Two studies that compare the above algorithms show that delayed rekeying, with reduced communication load and rekeying rate, can improve the performance of key management [61, 62] .  ... 
doi:10.1007/s00530-003-0095-2 fatcat:fl5u6xiarzfxxezynq7t3slqri
« Previous Showing results 1 — 15 out of 7,924 results