2007 2nd International Symposium on Wireless Pervasive Computing 2007
DOI: 10.1109/iswpc.2007.342638
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Multicast in WirelessMAN

Abstract: Multicast delivery of data is a powerful mechanism that has strong potential in next generation networks. The increased efficiency over unicast is a definite advantage, but the use of multicast poses many security risks. Effectively adding security measures to a multicast service is an intriguing problem, especially when the service is deployed in a wireless setting. Next generation IEEE 802.16 standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…Note that the lifetimes of GTEKs as specified by the IEEE 802.16 standard are an important security consideration. Currently, the range is specified to be 0.5 hours minimum, 12 hours by default, and 7 days maximum [3]. This lifetime has great leverage on the relationship between scalability and forward/backward secrecy provided by the standard.…”
Section: Bs Ss : {Gkek} Kekmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that the lifetimes of GTEKs as specified by the IEEE 802.16 standard are an important security consideration. Currently, the range is specified to be 0.5 hours minimum, 12 hours by default, and 7 days maximum [3]. This lifetime has great leverage on the relationship between scalability and forward/backward secrecy provided by the standard.…”
Section: Bs Ss : {Gkek} Kekmentioning
confidence: 99%
“…The Efficient sub-Linear rekeying Algorithm with Perfect Secrecy (ELAPSE) protocol, a derivative of the Logical Key Hierarchy, and the ELAPSE+ protocol, an improved version of ELAPSE, are proposed. An overview of ELAPSE can be found in our preliminary work [3]. ELAPSE overcomes the lack of backward and forward secrecy of the 802.…”
Section: Introductionmentioning
confidence: 99%
“…forward secrecy, backward secrecy and the scalability. To address the above issues, ELAPSE (Efficient sub-Linear rekeying Algorithm with Perfect Secrecy) has been proposed [1,5,23]. ELAPSE is proposed to counter the weaknesses of MBRA, i.e.…”
Section: Introductionmentioning
confidence: 99%