Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 18
Page No. 3562 - 3576

ASAKE: Adaptive Secure Authenticated Key Establishment Mechanism for Dynamic Networks

Authors : A. John Prakash and B. Lydia Elizabeth

References

Amir, Y., Y. Kim, C. Nita-Rotary and G. Tsudik, 2004. On the performance of group key agreement protocols. Trans. Inform. Syst. Secur., 7: 457-488.
CrossRef  |  

Arockiasamy, J.P., L.E. Benjamin and R.U. Vaidyanathan, 2012. Performance evaluation of multicrypt encryption mechanism. Am. J. Appl. Sci., 9: 1849-1861.
Direct Link  |  

Boyd, C., K.K.R. Choo and A. Mathuria, 2006. An Extension to Bellare and Rogaway 1993 Model: Resetting Compromised Long-Term Keys. In: Information Security and Privacy. Batten, L.M. and S.N. Reihaneh (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-35458-1, pp: 371-382.

Canetti, R., J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, 1999. Multicast security: A taxonomy and some efficient constructions. Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, March 21-25, IEEE Computer Society, New York, pp: 708-716.

Chan, K.C. and S.H. Chan, 2002. Distributed servers approach for large-scale secure multicast. IEEE. J. Sel. Areas Commun., 20: 1500-1510.
CrossRef  |  Direct Link  |  

Daghighi, B., M.L.M. Kiah, S. Shamshirband and M.H.U. Rehman, 2015. Toward secure group communication in wireless mobile environments: Issues, solutions and challenges. J. Network Comput. Appl., 50: 1-14.
CrossRef  |  Direct Link  |  

Hardjono, T. and G. Tsudik, 2000. IP Multicast Security: Issues and Directions. In: Annales Des Telecommunications. Hardjono, T. and G. Tsudik (Eds.). Springer-Verlag, Berlin, Germany, pp: 324-340.

Harkins, R., E. Weber and A. Westmeyer, 2005. Encryption schemes using finite frames and hadamard arrays. Exp. Math., 14: 423-433.
CrossRef  |  Direct Link  |  

Hegland, A.M., E. Winjum, S.F. Mjolsnes, C. Rong, O. Kure and P. Spilling, 2006. A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials, 8: 48-66.
CrossRef  |  

Hou, J. and Y. Fang, 2001. Mobility-based call admission control schemes for wireless mobile networks. Wirel. Commun. Mobile Comp., 1: 269-282.
CrossRef  |  Direct Link  |  

Mehdizadeh, A., F. Hashim and M. Othman, 2014. Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks. J. Network Comput. Appl., 42: 59-69.
CrossRef  |  Direct Link  |  

Nguyen, L.H. and A.W. Roscoe, 2011. Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. J. Comput. Secur., 19: 139-201.
CrossRef  |  Direct Link  |  

Prakash, A.J. and V.R. Uthariaraj, 2009. Multicrypt: A provably secure encryption scheme for multicast communication. Proceedings of the First International Conference on Networks and Communications NETCOM'09, December 27-29, 2009, IEEE, Chennai, India, ISBN: 978-1-4244-5364-1, pp: 246-253.

Prakash, A.J., V.R. Uthariaraj and B.L. Elizabeth, 2016. Efficient key management protocol with predictive rekeying for dynamic networks. Proceedings of the 2016 2nd International Conference on Green High Performance Computing (ICGHPC), February 26-27, 2016, IEEE, Nagercoil, India, ISBN: 978-1-4673-6614-4, pp: 1-6.

Rafaeli, S. and D. Hutchison, 2003. A survey of key management for secure group communication. ACM Comput. Surv., 35: 309-329.
CrossRef  |  

Setia, S., S. Koussih and S. Jajodia, 2000. Kronos: A scalable group re-keying approach for secure multicast. Proceedings of the IEEE Symposium on Security and Privacy, May 14-17, Berkeley, CA., USA., pp: 215-228.

Sterner, M., G. Tsudik and M. Waidner, 1996. Diffie-Hellman key distribution extended to groups. Proceedings of the Third ACM Conference on Computer and Communication Security, March 14-15, 1996, ACM Press, New Delhi, India,-pp: 31.

Wong, C.K., M. Gouda and S.S. Lam, 2000. Secure group communications using key graphs. IEEE/ACM Trans. Networking, 8: 16-30.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved