2008
DOI: 10.1016/j.peva.2007.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Performance optimization of region-based group key management in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 41 publications
0
21
0
Order By: Relevance
“…They identified the optimal intrusion detection rate and the optimal regional area size under which the mean time to security failure of the system is increased and/or the total communication cost is decreased for GCSs, given a set of parameter values characterizing operational and environmental conditions. Jin-Hee Choa et al [18] have proposed a scalable and efficient region-based group key management protocol for securing group communications. They considered a regionbased approach for providing scalability and dynamic re-configurability.…”
Section: Hierarchical or Tree Based Group Key Management Techniquesmentioning
confidence: 99%
“…They identified the optimal intrusion detection rate and the optimal regional area size under which the mean time to security failure of the system is increased and/or the total communication cost is decreased for GCSs, given a set of parameter values characterizing operational and environmental conditions. Jin-Hee Choa et al [18] have proposed a scalable and efficient region-based group key management protocol for securing group communications. They considered a regionbased approach for providing scalability and dynamic re-configurability.…”
Section: Hierarchical or Tree Based Group Key Management Techniquesmentioning
confidence: 99%
“…Several recent works investigated the group key management for scalability and energy efficiency performance in MANETs as in [15][16][17][18]26,27]. In [15], Zhu et al studied the flexibility and scalability of dealing with risks in the practical usage of ad hoc networks and proposed a hierarchical scheme based on threshold cryptography to address both security and efficiency of key management in MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…In [15], Zhu et al studied the flexibility and scalability of dealing with risks in the practical usage of ad hoc networks and proposed a hierarchical scheme based on threshold cryptography to address both security and efficiency of key management in MANETs. In [16], Cho et al proposed a scalable and efficient group key management protocol for secure group communications in MANETs and identified the optimal settings of the key management protocol to minimize the network traffic as well as to efficiently balance intergroup vs. intra-regional group key management overheads. Based on it, in [17], Cho et al integrated the above group key management protocol with intrusion detection to handle both outsider and insider security attacks for group communication systems (GCSs) in MANETs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, each node's capacity to disseminate packets per second is limited by its "average workload." We adopt a hierarchical network structure [5] for scalability by having a leader in each region, called "regional leader". For any communications between two nodes in two different regions, including communications for auctioning, a packet is disseminated through the hierarchical structure such as noderegional leader -regional leader -node.…”
Section: A Network Modelmentioning
confidence: 99%