A reliable dissemination protocol for interactive collaborative applications
Proceedings of the third ACM international conference on Multimedia
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Communications of the ACM
The round complexity of verifiable secret sharing and secure multicast
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Application-Level Multicast Using Content-Addressable Networks
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
HyperCast: A Protocol for Maintaining Multicast Group Members in a Logical Hypercube Topology
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Overcast: reliable multicasting with on overlay network
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Application-layer multicasting with Delaunay triangulation overlays
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Deployment issues for the IP multicast service and architecture
IEEE Network: The Magazine of Global Internetworking
Multicast over wireless mobile ad hoc networks: present and future directions
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Current architectures for secure group communication schemes have been designed with both the Internet and network-level multicast as an underlying infrastructure. However, such schemes may not be suitable for wireless ad-hoc networks (WAHNs) which are now increasingly being used in several information sensitive applications. In this paper, we propose a novel architecture for secure group communication in WAHNs with no network-level multicast support. For improved efficiency and scalability, our architecture integrates secure multicast functions with group management tasks at the application layer. The architecture consists of key generation and key distribution schemes, which we developed in an earlier work. Here, we introduce a new collusion resistant key assignment protocol for a clustered WAHN. We show its implementability, scalability for communication and storage costs, and suitability for WAHNs.