Bandwidth Efficient Key Management for Secure Multicast in Clustered Wireless Networks |
Shin, Seung-Jae
(한국과학기술원 전산학과)
Hur, Jun-Beom (한국과학기술원 전산학과) Lee, Han-Jin (한국과학기술원 전산학과) Yoon, Hyun-Soo (한국과학기술원 전산학과) |
1 | C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEEI ACM Trans. Networking, vol.8, pp.l6-30, Feb. 2000 |
2 | D. Balenson, D. McGrew, and A. Shennan, "Key management for large dynamic groups: One-way function trees and amortized initialization," Internet Draft Report, Feb. 2000 |
3 | Y. Sun, W. Trappe, and K. Liu, "An efficient ke management scheme for secure wireless multicast," in proc. IEEE Int. Corif', Communications, ICC 2002, New York City, CA, May 2002, pp. 1236-1240 |
4 | L. Lazos and R. Poovendran, "Power proximity based key management for secure multicast in ad hoc networks," ACMISpringer J Wireless Networks (WINETJ), vol.l3. no.1, pp.127-148, Feb. 2007 DOI ScienceOn |
5 | J. Salida, L. Lazos, and R. Poovendran, "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach," IEEE/ ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004 DOI ScienceOn |
6 | Y. Sun and K. Liu, "Hierarchical group access control for secure multicast communications," IEEE/ ACM Trans. Networking, vol.15, no.6, pp. 1514-1526, Dec. 2007 DOI ScienceOn |
7 | L. Lazos, J. Salido, and R. Poovendran, "VP3: using vertex path and power proximity for energy efficient key distribution," in Proc. IEEE Vehicular Technology Corif'" VTC 2004, Los Angeles, CA, Sep. 2004, pp.1228-1232 |
8 | Y. Kim, A. "Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in proc. of the 7th ACM Conference in Computer and Communication Security, CCS 2000, Athens, Greece, Nov. 2000, pp. 235-241 |
9 | J. Robinson, E. Knightly, "A perfonnance study of deployment factors in wireless mesh networks," in proc. IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp.2054-2062 |
10 | L. Lazos and R. Poovendran, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks," in proc. IEEE Int. Corif', Communications, ICC 2004, Paris, France, pp.3633-3639, May 2004 |
11 | D. R. Stinson, Cryptography - Theory and Practice, 3rd Ed., Chapman & Hall/CRC, 2006 |
12 | R. Canetti, J. Garay, G. Itlus, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in proc. IEEE INFO COM, vol.2, Mar. 1999. pp.708-716 |
13 | M. M. Zonoozi and P Dassanayake, "User mobility modeling and characterization of mobility patterns," IEEE J. Selected Areas Commun., vol.15, pp.1239-1252, Sept. 1997 DOI ScienceOn |
14 | W. Trappe, J. Song, R. Poovendran, and K. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol.5, no.4, pp.544-557, Dec. 2003 DOI ScienceOn |
15 | Y. Sun, W. Trappe, and K. Liu, "Topology-aware key management schemes for wireless multicast," in proc. IEEE Global Telecommunications Corif',. GLOBECOM'02, San Francisco, CA, Dec. 2003. pp.1471-1475 |
16 | Y. Vardi, "Metrics useful in network tomography studies," IEEE Signal Process. Lett., vol.11, no.3, pp.353-355, Mar. 2004 DOI ScienceOn |
17 | http://grouper.ieee.org/ groups/S02/11IReports/tgs_update.htm |
18 | L. Lazos and R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographical location information," in proc. IEEE ICASSP 2003, Hong Kong, China, April 2003, pp.201-204 |
19 | D. Wallner, E. Harder, and R. Agee, "Key management for multicast: issues and architectures," Internet Draft (RFC 2627)} , Sep. 1998 |
20 | Y. Sun, W. Trappe, and K. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004 DOI ScienceOn |
21 | A. Hayter, Probabiliby and statistics for engineers and scientists, Thomson Brooks/Cole, 2007 |