Wireless and Mobile Network Security 2009
DOI: 10.1002/9780470611883.ch14
|View full text |Cite
|
Sign up to set email alerts
|

Key Management in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…However, this approach requires several decryption and re-encryption operations of multicast message, when it passes from a sub-group to another. ILOUS [4], AKMP [9], and BLADE [5] belong to this group.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, this approach requires several decryption and re-encryption operations of multicast message, when it passes from a sub-group to another. ILOUS [4], AKMP [9], and BLADE [5] belong to this group.…”
Section: Related Workmentioning
confidence: 99%
“…We can apply the time-driven method to this approach because it eliminates the bottleneck problem, which could be found in the centralized model [5]; however, there is a problem that the number of available keys (KEKs) decreases as the number of removed nodes increases. GKMPAN [3] asserts that the problem can be solved using big l and small m. However, for performance, we should choose small l and large m, because if a small l and a large m are used, a key is shared with many nodes so that the node can share the new TEK with a very small number of messages…”
Section: Gkmpanmentioning
confidence: 99%
See 2 more Smart Citations
“…However, group key management for large and dynamic groups in MANETs is difficult problem because of the requirement of scalability, security under the restrictions of nodes' available resources and unpredictable mobility [6]. But the group key management protocols dedicated to operate in wired networks are not suited to MANET, because of the characteristics and the challenges of such environments [7]. So many researchers are interesting of group key management for MANET.…”
Section: Introductionmentioning
confidence: 99%