A Rendezvous-Location Based Multicast Secure Communication in Ad Hoc Networks

Author:

Chiang Tzu Chiang1,Lin Hua Yi2,Chang Jia Lin3

Affiliation:

1. Tunghai University

2. China University of Technology

3. Hsing Kuo University of Management

Abstract

Mobile ad-hoc networking (MANET) is a collection of mobile nodes that want to communicate to each others, but has no fixed links like wireless infrastructure networks to provide group applications and services. Therefore we need concern about providing each node with a secure and efficient key management system for dynamically discovering other nodes which can directly communicate with. Due to the network topology of an ad hoc network changes frequently and unpredictable, so the security of multicast routing becomes more challenging than the traditional networks. In this paper, we describe how any users in the multicast group can compose the group keys and propose a hierarchical group key management to securely multicast data from the multicast source to the rest of the multicast members in wireless ad hoc networks. This approach has a hierarchical structure where the group members are partitioned into rendezvous-location based clusters which can reduce the cost of key management. It not only provides the multicast routing information, but also fits the robustness of the wireless networks and reduces the overhead for the security management.

Publisher

Trans Tech Publications, Ltd.

Subject

General Engineering

Reference10 articles.

1. Vasudevan, V. Sukumar, R. , Scalable secure multicast using multi server approach for wireless environments., Control, Automation, Communication and Energy Conservation, INCACEC 2009, June 2009, pages 1-10.

2. Yi ling Wang, Balasubramaniam Srinivasan, Hybrid Group Key Management Scheme for Secure Wireless Multicast, 6th IEEE/ACIS International Conference on Computer and Information Science, (2007).

3. Chung Kei Wong; Gouda, M.; Lam, S.S.; Secure group communications using key graphs", Proceedings of the Third International Conference on Information Technology: New Generations (ITNG, 06), 2006, Page(s): 16 -21.

4. Yi ling Wang, Balasubramaniam Srinivasan, Efficient Key Management for Secure Wireless Multicast, Third International Conference on Convergence and Hybrid Information Technology, 2008 , Page(s): 1131 - 1136.

5. Gouda, M.G.; Chin-Tser Huang; Elnozahy, E.N.; Key trees and the security of Interval multicast, Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on , 2002 , Page(s): 467 -468.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3