Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks 2007
DOI: 10.1145/1298239.1298263
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-service resilience password-based group key agreement for wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
8
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Key management in distributed/contributory-GKA are less difficult to deal with in each subgroup/cluster compared to the whole ad hoc network. So most recent works [18,20,21,25,26,30,31,35,39,[40][41][42] adopted subgroup/cluster based approach, in which the whole group is divided into clusters. Distinct controllers are utilized to control every cluster which minimizes the issue of imposing the work on a single point.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Key management in distributed/contributory-GKA are less difficult to deal with in each subgroup/cluster compared to the whole ad hoc network. So most recent works [18,20,21,25,26,30,31,35,39,[40][41][42] adopted subgroup/cluster based approach, in which the whole group is divided into clusters. Distinct controllers are utilized to control every cluster which minimizes the issue of imposing the work on a single point.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of CK-GKAs' [18,20,21,25,26,30,31,35,39,[40][41][42] presume a hierarchical framework of the clusters or hierarchical structure, then execute a natural key agreement schemes such as, D-H [34] or the Burmester and Desmedt (BD) [3] GKA scheme, or a variety GKA schemes [3,7,16,[35][36][37][38][39] is at first implemented locally in each cluster, after that utilize these CKs in the next level with equivalent or an alternate key agreement scheme among CHs' to generate the whole group key. For further information on a comparison of the existing protocols [18,21,25,26,28,30,31,33,43] in this direction, one can refer to Table 2, summary of the key characteristics of cluster based protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Teo and Tan [7] proposed the Group Key Agreement (GKA) protocol for Circular Hierarchical(CH) group model (GKA-CH) [5]. and the Burmester-Desmedt [6] GKA protocol is applied in every layer of a circular-hierarchical group structure.…”
Section: Gka-ch Protocolmentioning
confidence: 99%
“…The password-based GKA protocol for hierarchical group models (PB-GKA-HGM) is proposed by Teo and Tan [7]. This protocol creates a hierarchical structure based on three main entities: the main controller C in highest layer, various subgroup controllers (Si) and several members (M) in every subgroup.…”
Section: Pb-gka-hgm Protocol [mentioning
confidence: 99%