語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Key management in mobile ad hoc netw...
~
Wu, Bing.
FindBook
Google Book
Amazon
博客來
Key management in mobile ad hoc networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Key management in mobile ad hoc networks./
作者:
Wu, Bing.
面頁冊數:
138 p.
附註:
Adviser: Jie Wu.
Contained By:
Dissertation Abstracts International67-06B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223345
ISBN:
9780542765575
Key management in mobile ad hoc networks.
Wu, Bing.
Key management in mobile ad hoc networks.
- 138 p.
Adviser: Jie Wu.
Thesis (Ph.D.)--Florida Atlantic University, 2006.
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
ISBN: 9780542765575Subjects--Topical Terms:
626642
Computer Science.
Key management in mobile ad hoc networks.
LDR
:03418nam 2200289 a 45
001
974470
005
20110929
008
110929s2006 eng d
020
$a
9780542765575
035
$a
(UnM)AAI3223345
035
$a
AAI3223345
040
$a
UnM
$c
UnM
100
1
$a
Wu, Bing.
$3
1298399
245
1 0
$a
Key management in mobile ad hoc networks.
300
$a
138 p.
500
$a
Adviser: Jie Wu.
500
$a
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3249.
502
$a
Thesis (Ph.D.)--Florida Atlantic University, 2006.
520
$a
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
520
$a
We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k.
520
$a
Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
590
$a
School code: 0119.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
Florida Atlantic University.
$3
1017837
773
0
$t
Dissertation Abstracts International
$g
67-06B.
790
$a
0119
790
1 0
$a
Wu, Jie,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223345
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9132700
電子資源
11.線上閱覽_V
電子書
EB W9132700
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入