Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Communications of the ACM
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Symmetric Polynomials over \mathbb{Z}_m and Simultaneous Communication Protocols
FOCS '03 Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
IEEE Wireless Communications
A brief overview of ad hoc networks: challenges and directions
IEEE Communications Magazine - Part Anniversary
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The integration of different wireless networks such as cellular networks, WLANs and MANETs with a core IP network is an extremely complex and challenging task, involving issues at all layers of the protocol stack. It is expected that the future advancements in such an integrated heterogeneous network technology would provide a variety of services to the network users. For achieving the end- to- end security in a heterogeneous network environment, an integrated and robust security framework is to be developed and for that an efficient and decentralized key establishment scheme is a fundamental requirement. This paper proposes a hierarchical and decentralized key establishment scheme applying the principles of symmetric polynomials for the futuristic heterogeneous network environment.