Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014 (2014), Article ID 601625, 10 pages
http://dx.doi.org/10.1155/2014/601625
Research Article

Secure Collaborative Key Management for Dynamic Groups in Mobile Networks

Department of Computer Engineering, Ajou University, Suwon 443-749, Republic of Korea

Received 29 March 2014; Accepted 31 July 2014; Published 21 August 2014

Academic Editor: Young-Sik Jeong

Copyright © 2014 Sukin Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Canetti, T. Malkin, and K. Nissim, “Efficient communication-storage tradeoffs for multicast encryption,” in Proceedings of Advances in Cryptology (Eurocrypt '99), vol. 1592 of Lecture Notes in Computer Science, pp. 459–474, Prague, Czech Republic, May 1999.
  2. S. Setia, S. Koussih, S. Jajodia, and E. Harder, “Kronos: a scalable group re-keying approach for secure multicast,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 215–228, Berkeley, Calif, USA, May 2000. View at Scopus
  3. M. K. Reiter, “A secure group membership protocol,” IEEE Transactions on Software Engineering, vol. 22, no. 1, pp. 31–42, 1996. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Wallner, E. Harder, and R. Agee, “Key management for multicast: issues and architectures,” RFC 2627 Informational, 1999.
  5. C. K. Wong, M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16–30, 2000. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Mittra, “Iolus: a framework for scalable secure multicasting,” in Proceedings of the ACM (SIGCOMM '97), pp. 277–288, Cannes, France, September 1997.
  7. A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444–458, 2003. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, Washington, DC, USA, October 2003. View at Scopus
  9. S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach,” in Proceedings of the 11th IEEE International Conference on Network Protocols, pp. 326–335, Atlanta, Ga, USA, 2003.
  10. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. View at Google Scholar · View at MathSciNet · View at Scopus
  11. M. Burmester and Y. Desmedt, “A secure and scalable group key exchange system,” Information Processing Letters, vol. 94, no. 3, pp. 137–143, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  12. M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 31–37, New Delhi, India, March 1996. View at Scopus
  13. M. Steiner, G. Tsudik, and M. Waidner, “CLIQUES: a new approach to group key agreement,” in Proceedings of the 18th International Conference on Distributed Computing Systems, pp. 380–387, May 1998. View at Scopus
  14. Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, “On the performance of group key agreement protocols,” ACM Transactions on Information and System Security, vol. 7, no. 3, pp. 457–488, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Kim, A. Perrig, and G. Tsudik, “Tree-based group key agreement,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60–96, 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Kim, A. Perrig, and G. Tsudik, “Group key agreement efficient in communication,” IEEE Transactions on Computers, vol. 53, no. 7, pp. 905–921, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Wu, J. Wu, and D. Yuhong, “An efficient group key management scheme for mobile ad hoc networks,” International Journal of Security and Networks, vol. 4, no. 1-2, pp. 125–134, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. P. P. C. Lee, J. C. S. Lui, and D. K. Y. Yau, “Distributed collaborative key agreement and authentication protocols for dynamic peer groups,” IEEE/ACM Transactions on Networking, vol. 14, no. 2, pp. 263–276, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, “Group management for mobile Ad Hoc networks: design, implementation and experiment,” in Proceedings of the 6th International Conference on Mobile Data Management (MDM '05), pp. 192–199, Ayia Napa, Cyprus, May 2005. View at Scopus
  20. B. Singh and D. K. Lobiyal, “A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks,” Human-Centric Computing and Information Sciences, vol. 2, no. 13, pp. 1–18, 2012. View at Google Scholar
  21. C.-W. Chen, Y.-R. Tsai, and S.-J. Wang, “Cost-saving key agreement via secret sharing in two-party communication systems,” Journal of Convergence, vol. 3, no. 4, pp. 29–36, 2012. View at Google Scholar
  22. S. Mohanty and B. Majhi, “A strong designated verifiable dl based signcryption scheme,” Journal of Information Processing Systems, vol. 8, no. 4, pp. 567–574, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Stevens, A. K. Lenstra, and B. de Weger, “Chosen-prefix collisions for MD5 and applications,” International Journal of Applied Cryptography, vol. 2, no. 4, pp. 322–359, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus