Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 10
Page No. 1586 - 1595

An Efficient Mobility Aware Group Key Management Scheme for Securing Mobile Ad-Hoc Networks

Authors : V.S Janani and M.S.K. Manikandan

References

Chen, T.M. and V. Venkataramanan, 2005. Dempster-shafer theory for intrusion detection in ad hoc networks. Internet Comput. IEEE., 9: 35-41.
CrossRef  |  Direct Link  |  

Khurana, H., R. Bonilla, A. Slagell, R. Afandi and H.S. Hahm et al., 2005. Scalable Group Key Management with Partially Trusted Controllers. In: Networking-ICN 2005. Pascal, L. and P. Dini (Eds.). Springer Berlin Heidelberg, Berlin, Germany, pp: 662-672.

Ko, Y.B. and N.F. Vaidya, 1999. Geocasting in mobile ad hoc networks: Location-based multicast algorithms. Proceedings of the 2nd Workshop on Mobile Computer Systems and Applications, February 25-26, 1999, New Orleans, LA., pp: 101-110.

Li, L.C. and R.S. Liu, 2010. Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans. Wireless Commun., 9: 3072-3081.
CrossRef  |  

Li, M., Z. Feng, N. Zang, R.L. Graham and F.F. Yao, 2009. Approximately optimal trees for group key management with batch updates. Theor. Comput. Sci., 410: 1013-1021.
CrossRef  |  Direct Link  |  

Lin, C.H., H.H. Lin and J.C. Chang, 2006. Multiparty key agreement for secure teleconferencing. Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics, SMC'06, October 8-11, 2006, IEEE, Taipei, Taiwan, ISBN: 1-4244-0099-6, pp: 3702-3707.

Rahman, R.H. and L. Rahman, 2008. A new group key management protocol for wireless ad-hoc networks. Int. J. Comput. Inform. Sci. Eng., 2: 74-79.

Shamir, A., 1985. Identity-Based Cryptosystems and Signature Schemes. In: Advances in Cryptology, Blakley, G. and D. Chaum (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-15658-1, pp: 47-53.

Shin, S. and T. Kwon, 2007. Efficient and secure key agreement for merging clusters in ad-hoc networking environments. IEICE Trans. Commun., E90-B: 1575-1583.
CrossRef  |  Direct Link  |  

Steiner, M., G. Tsudik and M. Waidner, 2000. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst., 11: 769-780.
CrossRef  |  

Wu, B. and Y. Dong, 2010. A simple group key management approach for mobile ad hoc networks. Proceedings of the 5th 2010 IEEE International Conference on Networking, Architecture and Storage (NAS), July 15-17, 2010, IEEE, Macau, China, ISBN: 978-1-4244-8133-0, pp: 73-78.

Wu, B., J. Wu and Y. Dong, 2009. An efficient group key management scheme for mobile ad hoc networks. Intl. J. Secur. Networks, 4: 125-134.
CrossRef  |  Direct Link  |  

Zhang, J., L. Sun, Y. Tang and S. Yang, 2007. D-VKT: A scalable distributed key agreement scheme for dynamic collaborative groups. IEICE Trans. Commun., E90-B: 750-760.
CrossRef  |  Direct Link  |  

Zhao, K., L. Huang, H. Li, F. Wu and J. Chu et al., 2013. A survey on key management of identity-based schemes in mobile ad hoc networks. J. Commun., 8: 768-779.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved