Adaptive secure multicast in wireless networks

被引:22
|
作者
Han, Yiliang [1 ,2 ]
Gui, Xiaolin [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian 710049, Peoples R China
[2] Engn Coll Armed Police Force, Keylab Networks & Informat Secur, Dept Elect Technol, Xian 710086, Peoples R China
关键词
secure multicast; secure group communication; signcryption; multi-recipient generalized signcryption; IDENTITY-BASED SIGNCRYPTION; PUBLIC-KEY CRYPTOSYSTEM; PROVABLY SECURE; MANAGEMENT; SCHEME; ENCRYPTION; EFFICIENT; SIGNATURE; PROOFS;
D O I
10.1002/dac.1023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure multicast is one of the majority services in the near future. The frameworks for IP multicast cannot be directly applied in wireless networks. To address the natural issues of wireless multicast and enhance the efficiency, an adaptive secure multicast framework based on a new primitive called multi-recipient generalized signcryption and a multi-recipient generalized signcryption scheme based on the gap Diffie-Hellman problem (MGSC-GDH) are proposed. The key technologies to construct a high-performance adaptive scheme including identification function, randomness reusing are investigated. The framework provides separate or joint encryption and signature functions according to users' identities and requirements transparently, and has the ability to aggregate multiple unicast besides the common multicast service. Therefore, overheads are reduced sharply for multiple functions which are provided with a single primitive. By the precise reduction, the gap-bridge between the security of a base scheme and the corresponding multi-recipient generalized signcryption scheme is built, which is a direct measure to quantify the security. Analysis shows that MGSC-GDH is a semantic secure multi-recipient generalized signcryption scheme and more efficient than other similar schemes in computational and communicational aspects. It is suitable for dynamic environment for rekeying is avoided when membership changes. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:1213 / 1239
页数:27
相关论文
共 50 条
  • [1] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [2] Secure Multicast Routing Algorithm for Wireless Mesh Networks
    Matam, Rakesh
    Tripathy, Somanath
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016
  • [3] Proxy encryption based secure multicast in wireless mesh networks
    Han, Yiliang
    Gui, Xiaolin
    Wu, Xuguang
    Yang, Xiaoyuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 469 - 477
  • [4] Secure multicast in wireless networks of mobile hosts: Protocols and issues
    Bruschi, D
    Rosti, E
    [J]. MOBILE NETWORKS & APPLICATIONS, 2002, 7 (06): : 503 - 511
  • [5] Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
    Roberto Gorrieri
    Fabio Martinelli
    Marinella Petrocchi
    [J]. Journal of Automated Reasoning, 2008, 41 : 325 - 364
  • [6] Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues
    Danilo Bruschi
    Emilia Rosti
    [J]. Mobile Networks and Applications, 2002, 7 : 503 - 511
  • [7] Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
    Gorrieri, Roberto
    Martinelli, Fabio
    Petrocchi, Marinella
    [J]. JOURNAL OF AUTOMATED REASONING, 2008, 41 (3-4) : 325 - 364
  • [8] Multicast optimization in broadband adaptive optical wireless networks
    Mahdy, AM
    Deogun, JS
    [J]. 2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1780 - 1785
  • [9] Adaptive shared tree multicast in mobile wireless networks
    Univ of California Los Angeles, Los Angeles, United States
    [J]. Conf Rec IEEE Global Telecommun Conf, (1817-1822):
  • [10] Dynamic self-adaptive multicast in wireless networks
    Cai, K
    Lin, HZ
    Qiu, G
    [J]. INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 2200 - 2205