CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Data structures for weighted matching and nearest common ancestors with linking
SODA '90 Proceedings of the first annual ACM-SIAM symposium on Discrete algorithms
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Using encryption for authentication in large networks of computers
Communications of the ACM
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues
Proceedings of the 8th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
IEEE Transactions on Information Theory
Approximation Algorithms for Key Management in Secure Multicast
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
IEEE Transactions on Wireless Communications
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Key-update distribution in secure group communication
Computer Communications
Hi-index | 0.00 |
We address the problem of resource-efficient access control for group communications in wireless ad hoc networks. Restricting the access to group data can be reduced to the problem of securely distributing cryptographic keys to group members, known as the key distribution problem (KDP). We examine the KDP under four metrics: (a) member key storage, (b) group controller (GC) transmissions, (c) multicast group (MG) update messages, and (d) average update energy. For each metric, we formulate an optimization problem and show that the KDP has unique solutions for metrics (a) and (b), while is NP-complete for (c) and (d). We propose a cross-layer heuristic algorithm called VP3 that bounds member key storage, and GC transmissions, while significantly reducing the energy and bandwidth consumption of the network. We define the notion of path divergence as a measure of bandwidth efficiency of multicasting, and establish an analytical worst-case bound for it. Finally, we propose On-line VP3, which dynamically updates the key assignment structure according to the dynamics of the communication group in a resource-efficient way.