Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks 2003
DOI: 10.1145/986858.986872
|View full text |Cite
|
Sign up to set email alerts
|

Secure multicast groups on ad hoc networks

Abstract: In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aims at solving problems that are specific to ad hoc networks such as mobility, unreliable links, and cost of multihop communication.The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
1

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(44 citation statements)
references
References 29 publications
0
43
0
1
Order By: Relevance
“…Centralized approach is suffered from the O(n) problem and bottleneck problem. GKMPAN [3], CKDS [12], Kaya et al solution [13] belong this group. In Decentralized approach, it divides the group into several sub groups to relieve O(n) problem and bottleneck problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Centralized approach is suffered from the O(n) problem and bottleneck problem. GKMPAN [3], CKDS [12], Kaya et al solution [13] belong this group. In Decentralized approach, it divides the group into several sub groups to relieve O(n) problem and bottleneck problem.…”
Section: Related Workmentioning
confidence: 99%
“…The first category of research focuses on reducing the cost of each re-keying operation [1,3,5,7,9,13,14]. Especially, the local key hierarchy (LKH) method [1] reduces the cost into O(log n) by utilizing a binary key tree.…”
Section: Introductionmentioning
confidence: 99%
“…All aspects of the wireless sensor network are being examined including secure and efficient routing [29,31,32], data aggregation [33,34], group formation [35,36], and so on. Researchers therefore began focusing on building a sensor trust model to solve the problems beyond the capability of cryptographic security [37].…”
Section: Ids For Wireless Sensor Networkmentioning
confidence: 99%
“…Revocation is done periodically through the flooding of a certificate revocation list. Two significant differences between [11] and our work is that in [11], the authors assume the availability of mobile devices that are capable of performing asymmetric cryptographic operations, and do not consider the energy expenditure of the communication overhead as a design parameter.…”
Section: Gcmentioning
confidence: 99%