Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Key management in mobile ad hoc netw...
~
Wu, Bing.
Linked to FindBook
Google Book
Amazon
博客來
Key management in mobile ad hoc networks.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Key management in mobile ad hoc networks./
Author:
Wu, Bing.
Description:
138 p.
Notes:
Adviser: Jie Wu.
Contained By:
Dissertation Abstracts International67-06B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223345
ISBN:
9780542765575
Key management in mobile ad hoc networks.
Wu, Bing.
Key management in mobile ad hoc networks.
- 138 p.
Adviser: Jie Wu.
Thesis (Ph.D.)--Florida Atlantic University, 2006.
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
ISBN: 9780542765575Subjects--Topical Terms:
626642
Computer Science.
Key management in mobile ad hoc networks.
LDR
:03418nam 2200289 a 45
001
974470
005
20110929
008
110929s2006 eng d
020
$a
9780542765575
035
$a
(UnM)AAI3223345
035
$a
AAI3223345
040
$a
UnM
$c
UnM
100
1
$a
Wu, Bing.
$3
1298399
245
1 0
$a
Key management in mobile ad hoc networks.
300
$a
138 p.
500
$a
Adviser: Jie Wu.
500
$a
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3249.
502
$a
Thesis (Ph.D.)--Florida Atlantic University, 2006.
520
$a
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
520
$a
We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k.
520
$a
Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
590
$a
School code: 0119.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
Florida Atlantic University.
$3
1017837
773
0
$t
Dissertation Abstracts International
$g
67-06B.
790
$a
0119
790
1 0
$a
Wu, Jie,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223345
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9132700
電子資源
11.線上閱覽_V
電子書
EB W9132700
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login