Access Restriction

Author Manulis, M.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©2005
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science ♦ Natural sciences & mathematics ♦ Physics ♦ Electricity & electronics ♦ Technology ♦ Engineering & allied operations
Subject Keyword Concurrent computing ♦ Protocols ♦ Costs ♦ Mobile communication ♦ Ad hoc networks ♦ Computer networks ♦ Computational efficiency ♦ Cryptography ♦ Computer network management ♦ Mobile computing
Abstract Security of various group-oriented applications for mobile ad-hoc groups requires a group secret shared between all participants. Contributory group key agreement (CGKA) protocols, originally designed for peer groups in localand wide-area wired networks, can also be used in ad-hoc scenarios because of the similar security requirements and trust relationship between participants that excludes any trusted central authority (e.g., a group manager) from the computation of the group key. We revise original protocols from the perspective of the mobile ad-hoc communication, classify mobile ad-hoc groups based on the performance of involved mobile devices, specify trust relationship between participants, propose further optimizations to original protocols to achieve better communication, computation and memory complexities
Description Author affiliation: Horst-Gortz Inst., Ruhr-Univ., Bochum (Manulis, M.)
ISBN 0780394658
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-11-07
Publisher Place USA
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Size (in Bytes) 174.42 kB
Page Count 811
Starting Page 8
Ending Page 818

Source: IEEE Xplore Digital Library