Simulating computer systems: techniques and tools
Simulating computer systems: techniques and tools
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Hydra: A Decentralised Group Key Management
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Communication-Efficient Group Key Agreement
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
A scalable key management and clustering scheme for ad hoc networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
A conference key distribution system
IEEE Transactions on Information Theory
Dynamic key management in sensor networks
IEEE Communications Magazine
Scalable secure one-to-many group communication using dual encryption
Computer Communications
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
Hi-index | 0.00 |
We propose and analyse a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic reconfigurability, we take a region-based approach by which group members are broken into region-based subgroups. Leaders in subgroups securely communicate with each other to agree on a group key in response to membership change and member mobility-induced events. We propose a novel approach to identify the optimal setting of the region-based key management protocol to maximize the performance of the system. We show that secrecy requirements for secure group communication are satisfied, and that there exists an optimal region size that minimizes the network traffic as a result of efficiently trading inter-regional vs. intra-regional group key management overheads. We compare the proposed region-based key management protocol with nonregion-based key management to demonstrate the effectiveness. Analytical results are validated by extensive simulation.