Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
10
Page No.
1586 - 1595
References
Chen, T.M. and V. Venkataramanan, 2005. Dempster-shafer theory for intrusion detection in ad hoc networks. Internet Comput. IEEE., 9: 35-41.
CrossRef | Direct Link | Khurana, H., R. Bonilla, A. Slagell, R. Afandi and H.S. Hahm
et al., 2005. Scalable Group Key Management with Partially Trusted Controllers. In: Networking-ICN 2005. Pascal, L. and P. Dini (Eds.). Springer Berlin Heidelberg, Berlin, Germany, pp: 662-672.
Ko, Y.B. and N.F. Vaidya, 1999. Geocasting in mobile ad hoc networks: Location-based multicast algorithms. Proceedings of the 2nd Workshop on Mobile Computer Systems and Applications, February 25-26, 1999, New Orleans, LA., pp: 101-110.
Li, L.C. and R.S. Liu, 2010. Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans. Wireless Commun., 9: 3072-3081.
CrossRef | Li, M., Z. Feng, N. Zang, R.L. Graham and F.F. Yao, 2009. Approximately optimal trees for group key management with batch updates. Theor. Comput. Sci., 410: 1013-1021.
CrossRef | Direct Link | Lin, C.H., H.H. Lin and J.C. Chang, 2006. Multiparty key agreement for secure teleconferencing. Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics, SMC'06, October 8-11, 2006, IEEE, Taipei, Taiwan, ISBN: 1-4244-0099-6, pp: 3702-3707.
Rahman, R.H. and L. Rahman, 2008. A new group key management protocol for wireless ad-hoc networks. Int. J. Comput. Inform. Sci. Eng., 2: 74-79.
Shamir, A., 1985. Identity-Based Cryptosystems and Signature Schemes. In: Advances in Cryptology, Blakley, G. and D. Chaum (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-15658-1, pp: 47-53.
Shin, S. and T. Kwon, 2007. Efficient and secure key agreement for merging clusters in ad-hoc networking environments. IEICE Trans. Commun., E90-B: 1575-1583.
CrossRef | Direct Link | Steiner, M., G. Tsudik and M. Waidner, 2000. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst., 11: 769-780.
CrossRef | Wu, B. and Y. Dong, 2010. A simple group key management approach for mobile ad hoc networks. Proceedings of the 5th 2010 IEEE International Conference on Networking, Architecture and Storage (NAS), July 15-17, 2010, IEEE, Macau, China, ISBN: 978-1-4244-8133-0, pp: 73-78.
Wu, B., J. Wu and Y. Dong, 2009. An efficient group key management scheme for mobile ad hoc networks. Intl. J. Secur. Networks, 4: 125-134.
CrossRef | Direct Link | Zhang, J., L. Sun, Y. Tang and S. Yang, 2007. D-VKT: A scalable distributed key agreement scheme for dynamic collaborative groups. IEICE Trans. Commun., E90-B: 750-760.
CrossRef | Direct Link | Zhao, K., L. Huang, H. Li, F. Wu and J. Chu
et al., 2013. A survey on key management of identity-based schemes in mobile ad hoc networks. J. Commun., 8: 768-779.
CrossRef | Direct Link |