Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Impact of mobility on distributed computations
ACM SIGOPS Operating Systems Review
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Mobile wireless computing: challenges in data management
Communications of the ACM
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast security and its extension to a mobile environment
Wireless Networks
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Secure multicast routing in wireless networks
ACM SIGMOBILE Mobile Computing and Communications Review
Key management for secure multicast over IPv6 wireless networks
EURASIP Journal on Wireless Communications and Networking
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Ad Hoc and Ubiquitous Computing
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Secure source specific multicast for networks including mobile hosts
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Secure multicast in micro-mobility environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Hi-index | 0.00 |
Multicast services and wireless interconnection networks are among the emerging technologies of the last decade. A significant amount of research has been separately performed in the areas of secure multicast and wireless interconnection networks. In this paper we investigate the issues of designing secure multicast services in wireless mobile environments for dynamic groups and propose protocols for key management for a variety of scenarios. Our solution decouples mobility management from group dynamics management, by taking into account the level of trust in the support stations. In particular, we show that protocol efficiency on the mobile host side can be traded-off with the level of trust in the support stations.