Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
A conference key broadcasting system using sealed locks
Information Systems
CryptoManiac: a fast flexible architecture for secure communication
ISCA '01 Proceedings of the 28th annual international symposium on Computer architecture
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Broadcasting in Hybrid Ad Hoc Networks
WONS '05 Proceedings of the Second Annual Conference on Wireless On-demand Network Systems and Services
Efficient data broadcast schemes for mobile computing environments with data missing
Information Sciences—Informatics and Computer Science: An International Journal
Dynamic adaptation of source specific distribution trees for multiparty teleconferencing
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
A System for Secure IP Telephone Conferences
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Leveraging digital backchannels to enhance user experience in electronically mediated communication
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Dynamic backup routes routing protocol for mobile ad hoc networks
Information Sciences: an International Journal
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
Information Sciences: an International Journal
Hi-index | 0.07 |
In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one's own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie-Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference call in an ad hoc network system.