A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Energy efficient CBMT for secure multicast key distribution in mobile ad hoc networks
2010
Procedia Computer Science
In many multicast interactions, a new member can join, a current member can leave at any time and existing members must communicate securely using multicast key distribution within constrained energy for ...
It also reduces end to end delay in multicast transmission. ...
for secure multicast communication. ...
doi:10.1016/j.procs.2010.11.032
fatcat:h7vpjw2tczajze3astenjx3key
Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey
2013
International Journal of Computer Applications
With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile ...
Key management is widely being adopted in securing group communication for both wired and wireless networks. ...
Key Tree in Mobile Multicast (KTMM): Authors of [21] propose two Key management protocols suitable for securing group communications in mobile multicast. ...
doi:10.5120/14629-2985
fatcat:egbeggvigjg6vh6dzzko3ishb4
Secure Multicast Key Distribution for Mobile Ad Hoc Networks
[article]
2010
arXiv
pre-print
Thus this paper shows the specific challenges towards multicast key management protocols for securing multicast key distribution in mobile ad hoc networks, and present relevant multicast key management ...
In many multicast interactions, new member can join and current members can leave at any time and existing members must communicate securely using multicast key distribution within constrained energy for ...
This paper extends and presents taxonomy of multicast key distribution protocols, dedicated to operate in ad hoc networks for secure multicast communications. ...
arXiv:1003.1799v1
fatcat:5gcy3vdnybhcfpuydjrfzcimra
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet
[chapter]
2005
Lecture Notes in Computer Science
This paper describes a secure multicast infrastructure for large-scale group communications in Mobile Internet and proposes a key management protocol based on the infrastructure. ...
The multicast communication domain is logically divided into several administrative areas with a key server associated with each area. ...
We propose a secure multicast infrastructure for large-scale group communications, and propose a key management protocol based on the infrastructure. ...
doi:10.1007/11534310_60
fatcat:dziozm3zrfh2jlxztwugrp4jdu
Secure multicast groups on ad hoc networks
2003
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03
The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. ...
We also proposed an extension to the basic secure multicast tree using multi-link capability combined with a k-out-of-N coding approach. ...
We propose a set of protocols that use locality to reduce the communication complexity of secure multicast for dynamic groups of mobile multihop nodes. ...
doi:10.1145/986858.986872
dblp:conf/sasn/KayaLNY03
fatcat:5tri2jishre57kgpfkcowj2kbi
CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement
2012
International Journal of Computer Networks & Communications
However, for successful deployment, security and efficiency of content delivery must be provided at first. This paper presents a new approach for secure multicast in wireless networks. ...
This approach, CRAW (Combination of Re-keying and Authentication in Wireless networks) combines member authentication procedure with group key management protocol to provide an efficient group re-keying ...
However, in [18] [19] [20] new re-keying protocols for secure wireless multicast communications have been proposed. ...
doi:10.5121/ijcnc.2012.4407
fatcat:4lcakg3aizfpvmqvwocqoxoy5e
A survey of ring-building network protocols suitable for command and control group communications
2005
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV
constant and independent of the size of the multicast group; this significantly reduces the complexity in, for example, the key distribution mechanism, (2) Reliable and totally-ordered message delivery ...
Multicasting is the enabling technology for group communication. ...
VRing
Totem
SecureRing
Spread
Secure
Transis
Adaptive
Spread
Real-Time
Group Multicast
Ring
Distributed
Distributed
Distributed
Distributed
Distributed
Distributed
Distributed
Management ...
doi:10.1117/12.604204
fatcat:ecrompt4tfh3zf7lzpmzgi4cta
EFFICIENT AND SECURE AUTHENTICATION BY USING 3-PATH TRANSMISSION IN AD HOC NETWORKS
2012
International Journal of Smart Sensor and Adhoc Network.
The authentication must be done without much delay and should independent of the other packets. In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks. ...
The proposed batch verification scheme as a part of the protocol poses a significant reduction within the message delay, then by using shared key process so requirement of the storage management is extremely ...
In multicast communication, a group key is given to every authorized member. This group key is used by the sender as a symmetric key to encipher the multicast traffic. ...
doi:10.47893/ijssan.2012.1144
fatcat:n7syrf5dn5bwjimz5r3u4t5lly
An Approach for Secure Mobile Ad Hoc Networks: Key Management and Routing
ENGLISH
2016
International Journal of Innovative Research in Computer and Communication Engineering
ENGLISH
Secure communication between two nodes in a network depends on reliable key management systems that generates and distributes keys between the communicating nodes and a secure routing protocol that establishes ...
Security protocols for MANET's can be categorized in two major categories: Prevention: This mechanism involves protocols which prohibits the attacking node to initiate any action. ...
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes ...
doi:10.15680/ijircce.2016.0407007
fatcat:oegnbkbsanembbh2mxov5gm2v4
A Survey on Group Key Management Schemes
2015
Cybernetics and Information Technologies
Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. ...
The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols. ...
Moreover, the key management follows a set of cryptographic techniques in generating and distributing the keys which may be symmetric or asymmetric for secure group communication. ...
doi:10.1515/cait-2015-0038
fatcat:qhbtuqohyfd4hooxvixqouz6iy
Secure multicast in various scenarios of WirelessMAN
2007
Proceedings 2007 IEEE SoutheastCon
Multicast is also supported in IEEE 802.16, and a Multicast and Broadcast Rekeying Algorithm (MBRA) is proposed as an optional function for secure multicast. ...
We also propose algorithms for secure multicast in different scenarios of WirelessMAN besides its basic scheme. ...
Encryption of group messages and selective distribution of the keys used for encryption is the primary method for ensuring the security. ...
doi:10.1109/secon.2007.342992
fatcat:aanicfk3jfd7th7uoqq7vzgini
A Survey on Multicasting in Software-Defined Networking
2018
IEEE Communications Surveys and Tutorials
We then present a survey of existing and proposed approaches to security for IP multicast and SDN multicast. ...
We present a survey of existing multicast routing protocols in IP multicast, and a survey of existing and proposed multicast routing algorithms in SDN multicast. ...
ACKNOWLEDGMENTS Support for Salekul Islam was provided in part by United International University (UIU), through its UIU Research Grant program. Support for J. ...
doi:10.1109/comst.2017.2776213
fatcat:4me7qfrjgnhthifholvkwl3s24
Impact of Mobility for Qos Based Secure Manet
2010
International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks
Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution for mobile adhoc networks. ...
Secure multicast communication in Mobile Adhoc Networks (MANETs) is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, limited resources ...
The Key management [5] includes creating, distributing and updating the keys then it constitutes a basic block for secure multicast communication applications. ...
doi:10.5121/jgraphoc.2010.2304
fatcat:lrthmvsukjdo3fvlz7wcqpeiyq
A secure and lightweight multicast communication system for Smart Grids
2018
EAI Endorsed Transactions on Security and Safety
In the Smart Grids context, all communications must be handled in a secure way, including multicast traffic. ...
The results show that this approach is lightweight, secure, and assures multicast message delivery, even on failures caused by attacks on the key distribution system. ...
To avoid it was created a secure protocol based on PKI to assure key distribution without vulnerabilities with known attacks. ...
doi:10.4108/eai.13-7-2018.156004
fatcat:geidjmzgnjbvjakkbaqnyaii5a
Multimedia security in group communications: recent progress in key management, authentication, and watermarking
2003
Multimedia Systems
Multicast security includes group membership control, secure key distribution, secure data transfer and copyright protection. ...
This makes multicast an ideal technology for communication among a large group of participants. ...
Two studies that compare the above algorithms show that delayed rekeying, with reduced communication load and rekeying rate, can improve the performance of key management [61, 62] . ...
doi:10.1007/s00530-003-0095-2
fatcat:fl5u6xiarzfxxezynq7t3slqri
« Previous
Showing results 1 — 15 out of 7,924 results