Identity-base group key management scheme in ad-hoc

被引:0
|
作者
College of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China [1 ]
不详 [2 ]
机构
来源
Tongxin Xuebao | 2009年 / 10 A卷 / 85-92期
关键词
Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
An identity-base group key management scheme in ad-hoc was proposed, which was based on distributing key management. In this scheme, nodes were divided into two parts, server nodes and ordinary nodes. The shares held by server nodes included more information than ordinary nodes. The scheme reducing the risk of distributing key shares to all nodes that compromising of any K node would leak the system's group key. The logical structure of the scheme was a grid. This scheme not only has the advantages of high connectivity and low overhand, but also has high expandability. It is analyzed that this scheme is more efficient, security and stronger anti-attack than traditional scheme.
引用
收藏
相关论文
共 50 条
  • [31] Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks
    Faragallah, Osama S.
    El-Zoghdy, S. F.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1297 - 1319
  • [32] Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks
    Osama S. Faragallah
    S. F. El-Zoghdy
    Wireless Personal Communications, 2016, 91 : 1297 - 1319
  • [33] Design a secure composite key-management scheme in Ad-Hoc Networks using Localization
    Ghoreishi, Seyed-Mohsen
    Analoui, Morteza
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 35 - 49
  • [34] An Efficient Pairwise Key Establishment Scheme for Ad-hoc Mobile Clouds
    Mandal, Subhajit
    Yang, Chen
    Altaweel, Ala
    Stoleru, Radu
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 627 - 634
  • [35] Biomarkers ad-hoc group
    Leake, R
    EUROPEAN CANCER NEWS, 1997, 9 (10): : 8 - 9
  • [36] Asynchronous power management scheme for wireless ad-hoc networks
    Kwon, SW
    Cho, DH
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2853 - 2857
  • [37] An architecture for key management in hierarchical mobile ad-hoc networks
    Rhee, KH
    Park, YH
    Tsudik, G
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (02) : 156 - 162
  • [38] Dynamically key management scheme for Ad Hoc networks
    College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
    Nanjing Hangkong Hangtian Daxue Xuebao, 2007, 6 (810-813):
  • [39] Mobile Ad-hoc Network Key Management with Certificateless Cryptography
    Zhang, Zhenfei
    Susilo, Willy
    Raad, Raad
    ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 575 - +
  • [40] A new scheme for key management in ad hoc networks
    Li, GS
    Han, WB
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 242 - 249