Communications of the ACM
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Journal of Systems and Software
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A survey of clustering schemes for mobile ad hoc networks
IEEE Communications Surveys & Tutorials
A survey of key management in ad hoc networks
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
Hi-index | 0.00 |
In Mobile ad hoc networks (MANETs), most of current research works in key management can efficiently handle only limited number of nodes. When the number of nodes is gradually increasing, they will become either more inefficient or more insecure. Therefore, how to develop key management schemes for efficiently and securely satisfying the dynamic property of MANETs is a crucial issue. In this paper, by combining the efficient elliptic curve cryptosystem, secure self-certified public key cryptosystem and secure filter technique, we construct dynamic group key management schemes based on hierarchical clustering in MANETs. Specifically, the proposed schemes will effectively renew the group key of intra-cluster or inter-cluster to achieve the forward secrecy and backward secrecy when a node/cluster-head joins or leaves a cluster/cross-cluster. In such a new way, we affirm that the proposed group key management schemes can be very useful for securing practical applications in MANETs.