2009
DOI: 10.1007/978-3-642-01004-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Group Key Agreements for Cluster Based Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…In the conventional GKA definition, a group of members interact to establish a common secret key within an open network. Since the publication of two-party Diffie-Hellman (DH) key exchange in 1976 [12], various solutions have been proposed to extend Diffie-Hellman key exchange to a multiparty key agreement [11,6,9,13,14,17,24,27,7,15,25,19,8,4,3,20,28,[21][22][23]16]. Most notable and best known among those proposals are the ITW protocols [19], BD protocols [8], d-cube protocols [4,3,20], CLIQUES [28], and tree-based protocols [21][22][23]16].…”
Section: Related Workmentioning
confidence: 99%
“…In the conventional GKA definition, a group of members interact to establish a common secret key within an open network. Since the publication of two-party Diffie-Hellman (DH) key exchange in 1976 [12], various solutions have been proposed to extend Diffie-Hellman key exchange to a multiparty key agreement [11,6,9,13,14,17,24,27,7,15,25,19,8,4,3,20,28,[21][22][23]16]. Most notable and best known among those proposals are the ITW protocols [19], BD protocols [8], d-cube protocols [4,3,20], CLIQUES [28], and tree-based protocols [21][22][23]16].…”
Section: Related Workmentioning
confidence: 99%
“…Key Setup Phase: Secure group key is constructed among the dynamically constructed group key using group key protocol [12]. 2.…”
Section: Procedures For Secure Code Updatementioning
confidence: 99%
“…CBKAP proto-cols are more efficient than pairwise key establishment schemes for WSNs because devices do not waste energy every time they wish to communicate with another de-vice by establishing a new shared secret key. The majority of cluster-based key agreement schemes [1], [2], [3], assume a specific hierarchical structure of the clusters or some tree-structure and then apply a general key agreement protocol. The CBKAP protocol is first applied locally in every cluster and then, the clusters' keys are used from the same or another key agreement mechanism to form the final group key [16].…”
Section: Cluster Based Key Agreement Protocols (Cbkap)mentioning
confidence: 99%