2007 International Conference on Networking, Architecture, and Storage (NAS 2007) 2007
DOI: 10.1109/nas.2007.27
|View full text |Cite
|
Sign up to set email alerts
|

HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…HKM proposed by L i n, X u e m i n g and Y o n g [37] for wireless environment is similar to TMKM and has Topology Matching (TM) sub trees and Topology Independent (TI) sub-trees. HKM tree uses two key management trees, namely, TIKM trees and TMKM trees and combines the features of these trees to manage high mobility and low mobility members, thus minimizing the rekeying overheads that occur during the handoff process.…”
Section: Tree Based Approachmentioning
confidence: 99%
“…HKM proposed by L i n, X u e m i n g and Y o n g [37] for wireless environment is similar to TMKM and has Topology Matching (TM) sub trees and Topology Independent (TI) sub-trees. HKM tree uses two key management trees, namely, TIKM trees and TMKM trees and combines the features of these trees to manage high mobility and low mobility members, thus minimizing the rekeying overheads that occur during the handoff process.…”
Section: Tree Based Approachmentioning
confidence: 99%
“…The authors of [13] propose a hybrid key management (HKM) tree suitable for mobile IP environments with topology matching (TM) sub trees and topology independent (TI) sub trees similar to TMKM [10] [11]. HKM is a network dependent protocol which is inspired by the topology of hierarchical cellular networks.…”
Section: A Hybrid Key Management Scheme (Hkm)mentioning
confidence: 99%
“…In this section, we have listed the related work that considered IGMP and/or handoff in mobile multicast. We have excluded the research work that is devoted to other issues (e.g., routing protocol [6], group key management [7]) of mobile multicast.…”
Section: Related Work and Its Limitationsmentioning
confidence: 99%