2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1313374
|View full text |Cite
|
Sign up to set email alerts
|

Towards integrating key distribution with entity authentication for efficient, scalable and secure group communication in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The fact that, i) no central authorization entity is assumed at all times for all nodes which makes the task of network operations more difficult [10] and ii) indicates the need for distributed algorithms to provide the functions of centralized entities. KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
Section: D) Key Distribution With Entity Authentication For Efficientmentioning
confidence: 99%
“…The fact that, i) no central authorization entity is assumed at all times for all nodes which makes the task of network operations more difficult [10] and ii) indicates the need for distributed algorithms to provide the functions of centralized entities. KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
Section: D) Key Distribution With Entity Authentication For Efficientmentioning
confidence: 99%
“…Global system for mobile communication) (GSM) is more common in Europe and uses a stream cipher algorithms such as A5/1 algorithm, to protect the security and privacy of point-to-point wireless communication systems. However, in U.S.A, Code Division Multiple Access (CDMA) technologies use spread spectrum technique to provide strong protection system which makes it difficult to be intercepted except by skilled hackers and law enforcement [17].…”
Section: Security Requirements and Countermeasuresmentioning
confidence: 99%
“…Step (6): The jth authentication process ends. If wants to perform the above protocol for the next round of mutual authentication between the system and user, user again want to set j=j+1 and goes to Step (0).…”
Section: The Jth Authentication Protocol For Mobile User and The Systemmentioning
confidence: 99%
“…The computation requirement for mobile device is quite low. Maria et al, [6] focuses on the design of key management (KM) for the environment of Mobile Ad Hoc Networks (MANETs). KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
Section: Literature Surveymentioning
confidence: 99%