Identity-base group key management scheme in ad-hoc

被引:0
|
作者
College of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China [1 ]
不详 [2 ]
机构
来源
Tongxin Xuebao | 2009年 / 10 A卷 / 85-92期
关键词
Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
An identity-base group key management scheme in ad-hoc was proposed, which was based on distributing key management. In this scheme, nodes were divided into two parts, server nodes and ordinary nodes. The shares held by server nodes included more information than ordinary nodes. The scheme reducing the risk of distributing key shares to all nodes that compromising of any K node would leak the system's group key. The logical structure of the scheme was a grid. This scheme not only has the advantages of high connectivity and low overhand, but also has high expandability. It is analyzed that this scheme is more efficient, security and stronger anti-attack than traditional scheme.
引用
收藏
相关论文
共 50 条
  • [21] An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks
    Janani, V. S.
    Manikandan, M. S. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (03) : 857 - 876
  • [22] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [23] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks
    Zhang, Jianmin
    Li, Jian
    ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
  • [24] Scalable and secure group key agreement for wireless ad-hoc networks by extending RSA scheme
    Alphonse, P. J. A.
    Reddy, Venkatramana Y.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (14):
  • [25] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    AD HOC NETWORKS, 2008, 6 (04) : 560 - 577
  • [26] An Efficient Group Key Agreement Protocol for Ad-Hoc Networks
    Rahman, Rony Hasinur
    Rahman, M. Lutfar
    PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 478 - 483
  • [27] A New Ad hoc Group Key Agreement Scheme
    Bu, Shanyue
    Kou, Haizhou
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1558 - 1562
  • [28] A group key establishment scheme for ad hoc networks
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 518 - 520
  • [29] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
    Wang, Fei
    Tang, Helen
    Yu, F. Richard
    Mason, Peter C.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
  • [30] A Hybrid Key Management Scheme for Ad-hoc Wireless Sensor Networks to improvesecure link establishment
    Rehman, Saif ur
    Gang, Cui
    Purevsuren, Dalaijargal
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 119 - 122