Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
SIM-KM: Scalable Infrastructure for Multicast Key Management
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Pervasive data access in wireless and mobile computing environments: Research Articles
Wireless Communications & Mobile Computing
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Secure group communication in wireless mesh networks
Ad Hoc Networks
Adaptive secure multicast in wireless networks
International Journal of Communication Systems - Secure communications and data management in ubiquitous services
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Weaknesses in the Hur–Shin–Yoon decentralized group key management
Wireless Communications & Mobile Computing
Secure hybrid encryption from weakened key encapsulation
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Secure multicast using proxy encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
A Survey of Application-Layer Multicast Protocols
IEEE Communications Surveys & Tutorials
New directions in cryptography
IEEE Transactions on Information Theory
A conference key distribution system
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
International Journal of Wireless Networks and Broadband Technologies
Hi-index | 0.00 |
A decentralized and self-healing secure multicast framework is proposed, which is based on the new multi-hop proxy encryption, in order to address the unique vulnerabilities of wireless mesh network. The topology aware key encryption key (KEK) is generated first. The session key, used as the traffic encryption key (TEK), is distributed along the key path. The routers only transform and forward the received message instead of decrypting and re-encrypting. Then the service data is encapsulated by the authenticated encryption efficiently. The proposal achieves the data confidentiality, the data integrity, the source authentication, and the backward/forward secrecy simultaneously. The highlight is threefold: (1) The centralized key distribution center, the trusted party and the private channel are eliminated. (2) All of the local traffic is broadcasted, which reduces the communication cost. (3) The self-healing mechanism cures the link failure caused by the failed routers and reconstructs the multicast key path. Compared with the similar schemes, the proposal has advantages with regard to the storage overheads, the computational delay, and the rekeying cost.