International Journal of Soft Computing

Year: 2014
Volume: 9
Issue: 3
Page No. 183 - 188

An Optimized Color-Based Key Generation Algorithm for Secure Group Communications in MANETs

Authors : B. Gopalakrishnan and A. Shanmugam

References

Al Shayeji, M.H., A.R.R. Al-Azmi, A.A.R. Al-Azmi and M.D. Samrajesh, 2011. Analysis and enhancements of leader elections algorithms in mobile ad hoc networks. ACEEE Int. J. Network Secur., 2: 19-24.
Direct Link  |  

Amir, Y., Y. Kim, C. Nita-Rotaru, J.L. Schultz, J. Stanton and G. Tsudik, 2004. Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst., 15: 468-480.
CrossRef  |  

Banerjee, S. and B. Bhattacharjee, 2000. Scalable secure group communication over IP multicast. IEEE J. Sel. Areas Commun., 20: 1511-1527.
CrossRef  |  

Bouassida, M.S., I. Chrisment and O. Festor, 2008. Group key management in MANETs. Int. J. Network Secur., 6: 67-79.
Direct Link  |  

Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef  |  Direct Link  |  

Dutta, R. and R. Barua, 2008. Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inform. Theory, 54: 2007-2025.
CrossRef  |  

Gharout, S., A. Bouabdallah, Y. Challal and M. Achemlal, 2012. Adaptive group key management protocol for wireless communications. J. Universal Comput. Sci., 18: 874-898.
Direct Link  |  

Harney, H. and C. Muckenhirn, 1997. Group Key Management Protocol (GKMP) architecture. Network Working Group Request for Comments: 2094, Category: Experimental, SPARTA Inc., July 1997. http://tools.ietf.org/pdf/rfc2094.pdf.

Hegland, A.M., E. Winjum, S.F. Mjolsnes, C. Rong, O. Kure and P. Spilling, 2006. A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials, 8: 48-66.
CrossRef  |  

Jain, D. and Umang, 2012. Performance comparison of distributed group key management protocol based on region based group key management. Proceedings of the National Conference on Communication Technologies and its Impact on Next Generation Computing, November 9-11, 2012, Foundation of Computer Science, New York, USA., pp: 4-8.

Kamal, A.A., 2013. Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int. J. Network Secur., 15: 59-61.
Direct Link  |  

Kim, Y., A. Perrig and G. Tsudik, 2000. Simple and fault-tolerant key agreement for dynamic collaborative groups. Proceedings of the 7th ACM Conference on Computer Communication Security, November 1-4, 2000, Athens, Greece, pp: 235-244.

Klaoudatou, E., E. Konstantinou, G. Kambourakis and S. Gritzalis, 2011. A survey on cluster-based group key agreement protocols for WSNs. IEEE Communi. Surveys Tutorials, 13: 429-442.
CrossRef  |  Direct Link  |  

Kumar, A., A. Aggarwal and Charu, 2012. Efficient hierarchical threshold symmetric group key management protocol for mobile ad hoc networks. Proceedings of the 5th International Conference on Contemporary Computing, August 6-8, 2012, Noida, India, pp: 335-346.

Lima, M.N., A.L. dos Santos and G. Pujolle, 2009. A survey of survivability in mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 11: 66-77.
CrossRef  |  

Lin, C.H. and C.Y. Lee, 2010. Modified autonomous key management scheme with reduced communication/computation costs in MANET. Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, February 15-18, 2010, Krakow, Poland, pp: 818-821.

Park, M.H., Y.H. Park, H.Y. Jeong and S.W. Seo, 2013. Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput., 12: 1712-1723.
CrossRef  |  

Rafaeli, S. and D. Hutchison, 2003. A survey of key management for secure group communication. ACM Comput. Surv., 35: 309-329.
CrossRef  |  

Rahman, R.H. and L. Rahman, 2008. A new group key management protocol for wireless ad-hoc networks. Int. J. Comput. Inform. Sci. Eng., 2: 74-79.

Rong, B., H.H. Chen, Y. Qian, K. Lu, R.Q. Hu and S. Guizani, 2009. A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: The key management study. IEEE Trans. Veh. Technol., 58: 398-408.
CrossRef  |  

Seba, H., S. Lagraa and H. Kheddouci, 2012. Alliance-based clustering scheme for group key management in mobile ad hoc networks. J. Supercomput., 61: 481-501.
CrossRef  |  

Steiner, M., G. Tsudik and M. Waidner, 2000. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst., 11: 769-780.
CrossRef  |  

Sun, Y. and K.J.R. Liu, 2007. Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Networking, 15: 1514-1526.
CrossRef  |  

Teng, J. and C. Wu, 2012. A provable authenticated certificateless group key agreement with constant rounds. J. Commun. Networks, 14: 104-110.
CrossRef  |  

Wong, C.K., M. Gouda and S.S. Lam, 2000. Secure group communications using key graphs. IEEE/ACM Trans. Networking, 8: 16-30.
CrossRef  |  

Zhang, G., X. Fu and C. Ma, 2012. Attribute-based authenticated group key management protocol for mobile peer-to-peer network. China Commun., 9: 68-77.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved