42
Views
0
CrossRef citations to date
0
Altmetric
THEMED ARTICLES: DATA COMMUNICATIONS & NETWORK SECURITY

Effective Key Management Protocol for Extremely Self-Motivated Environment

, &
Pages 311-318 | Published online: 10 Dec 2007

REFERENCES

  • Asokan , N. and Ginzboorg , P. 2000 . Key agreement in ad hoc networks. . Computer Communication , 23 ( 17 ) : 1627 – 1637 .
  • Babu , P. , Khatn , N. and Little , T. D. A mobility based metric for clustering in Mobile Ad hoc Networks . In Proceedings of Distributed Computing Systems Workshop . April 2001 , Boston , Massachusetts . Boston University .
  • Eschenauer, L. & Gligor, V. D. (2002, November), A key management scheme for distributed sensor networks”, In Proceeding of ACM CCS'02, WCNC. 2004 IEEE. (pp. 41–47).
  • Er , I. I. and Seah , W. K. G. Mobility-based d-Hop Clustering Algorithm for Mobile Ad Hoc Networks . Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE. Vol. 4 , pp. 2359 – 2364 .
  • Gouda , M. G. , Lam , S. S. , Li , X. Z. S. and Yang , Y. R. Batch Rekeying for Secure Group Communications . In, Proceedings of the 10th international conference on World Wide Web Hong Kong . 2001 , Hong Kong . pp. 525 – 534 . International World Wide Web Conference
  • Jajodia , S. , Setia , S. , Xu , S. and Zhu , S. GKMPAN: An Efficient Group Re-keying Scheme for Secure Multicast in Ad Hoc Networks. In Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04) 2004, IEEE .
  • Kaavi, J. (2004–2005), “Group Key Distribution in Ad-Hoc Networks Using MIKEY”, HUT T-110.551 Seminar on Internetworking.
  • Kim , Y. and Tsudik , G. 2004, February . Tree-Based Group Key Agreement. . ACM Transactions on Information and System Security , 7 ( 1 ) : 60 – 96 .
  • Schiller , J. 2003 . Mobile Communications. , New York : Person Education Ltd. .
  • Schneier , B. 1996 . Applied Cryptography , 2nd ed. , New York : John Willey and Sons, Inc. .
  • Shamir , A. 1979, November . How to share a secret. . Communication of the ACM , 22 ( 11 ) : 612 – 613 .
  • Zhou and Haas , Z. J. 1999, Nov/Dec . Securing Ad Hoc Networks, 1 . IEEE Network, Special Issue on Network Security , 3 ( 6 ) : 24 – 30 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.