Adaptive secure multicast in wireless networks

被引:22
|
作者
Han, Yiliang [1 ,2 ]
Gui, Xiaolin [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian 710049, Peoples R China
[2] Engn Coll Armed Police Force, Keylab Networks & Informat Secur, Dept Elect Technol, Xian 710086, Peoples R China
关键词
secure multicast; secure group communication; signcryption; multi-recipient generalized signcryption; IDENTITY-BASED SIGNCRYPTION; PUBLIC-KEY CRYPTOSYSTEM; PROVABLY SECURE; MANAGEMENT; SCHEME; ENCRYPTION; EFFICIENT; SIGNATURE; PROOFS;
D O I
10.1002/dac.1023
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure multicast is one of the majority services in the near future. The frameworks for IP multicast cannot be directly applied in wireless networks. To address the natural issues of wireless multicast and enhance the efficiency, an adaptive secure multicast framework based on a new primitive called multi-recipient generalized signcryption and a multi-recipient generalized signcryption scheme based on the gap Diffie-Hellman problem (MGSC-GDH) are proposed. The key technologies to construct a high-performance adaptive scheme including identification function, randomness reusing are investigated. The framework provides separate or joint encryption and signature functions according to users' identities and requirements transparently, and has the ability to aggregate multiple unicast besides the common multicast service. Therefore, overheads are reduced sharply for multiple functions which are provided with a single primitive. By the precise reduction, the gap-bridge between the security of a base scheme and the corresponding multi-recipient generalized signcryption scheme is built, which is a direct measure to quantify the security. Analysis shows that MGSC-GDH is a semantic secure multi-recipient generalized signcryption scheme and more efficient than other similar schemes in computational and communicational aspects. It is suitable for dynamic environment for rekeying is avoided when membership changes. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:1213 / 1239
页数:27
相关论文
共 50 条
  • [21] Adaptive Secure Transmission for Wireless Powered Communication Networks
    Wang, Yong
    Yang, Weiwei
    Zhang, Tao
    Chen, Yong
    Shang, Xiaohui
    Wang, Quan
    [J]. CHINA COMMUNICATIONS, 2021, 18 (03) : 155 - 173
  • [22] Adaptive Secure Transmission for Wireless Powered Communication Networks
    Yong Wang
    Weiwei Yang
    Tao Zhang
    Yong Chen
    Xiaohui Shang
    Quan Wang
    [J]. China Communications, 2021, 18 (03) : 155 - 173
  • [23] Hierarchical agent-based secure and reliable multicast in wireless mesh networks
    Li, Yinan
    Chen, Ing-Ray
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (14) : 1515 - 1526
  • [24] Key management for secure multicast over IPv6 wireless networks
    Aye, Win
    Siddiqi, Andmohammad Umar
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [25] BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks
    Curtmola, Reza
    Nita-Rotaru, Cristina
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (04) : 445 - 459
  • [26] Key Management for Secure Multicast over IPv6 Wireless Networks
    Win Aye
    Mohammad Umar Siddiqi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2006
  • [27] An adaptive modulation method for multicast communications of hierarchical data in wireless networks
    Hwang, CS
    Kim, Y
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 896 - 900
  • [28] Performance Analysis of Adaptive Multicast Streaming Services in Wireless Cellular Networks
    Li, Mingfu
    Wu, Yung-Hsiang
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (11) : 2616 - 2630
  • [29] Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
    Nabila Labraoui
    Mourad Gueroui
    Makhlouf Aliouat
    Jonathan Petit
    [J]. Telecommunication Systems, 2013, 54 : 3 - 17
  • [30] Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
    Labraoui, Nabila
    Gueroui, Mourad
    Aliouat, Makhlouf
    Petit, Jonathan
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 54 (01) : 3 - 17