Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues

被引:0
|
作者
Danilo Bruschi
Emilia Rosti
机构
来源
关键词
multicast; security; wireless networks; mobility; trust;
D O I
暂无
中图分类号
学科分类号
摘要
Multicast services and wireless interconnection networks are among the emerging technologies of the last decade. A significant amount of research has been separately performed in the areas of secure multicast and wireless interconnection networks. In this paper we investigate the issues of designing secure multicast services in wireless mobile environments for dynamic groups and propose protocols for key management for a variety of scenarios. Our solution decouples mobility management from group dynamics management, by taking into account the level of trust in the support stations. In particular, we show that protocol efficiency on the mobile host side can be traded-off with the level of trust in the support stations.
引用
收藏
页码:503 / 511
页数:8
相关论文
共 50 条
  • [1] Secure multicast in wireless networks of mobile hosts: Protocols and issues
    Bruschi, D
    Rosti, E
    [J]. MOBILE NETWORKS & APPLICATIONS, 2002, 7 (06): : 503 - 511
  • [2] Secure source specific multicast for networks including mobile hosts
    Shim, YC
    Park, JC
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 181 - 190
  • [3] Secure multicast routing protocols in mobile ad-hoc networks
    Moamen, Ahmed Abdel
    Hamza, Haitham S.
    Saroit, Iman A.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2808 - 2831
  • [4] Hierarchical synchronized multimedia multicast for mobile hosts in heterogeneous wireless networks
    Chang, Ing-Chau
    Hsieh, Chih-Sung
    [J]. INFORMATION NETWORKING: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 112 - 121
  • [5] Reliable multicast protocols for wireless networks
    Martinescu, M.
    Sisak, F.
    [J]. OPTIM 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON OPTIMIZATION OF ELECTRICAL AND ELECTRONIC EQUIPMENT, VOL III, 2008, : 237 - +
  • [6] Adaptive secure multicast in wireless networks
    Han, Yiliang
    Gui, Xiaolin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (09) : 1213 - 1239
  • [7] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    [J]. ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [8] A reliable multicast protocol in networks with mobile hosts
    On, BW
    Park, MS
    [J]. DOA'00: INTERNATIONAL SYMPOSIUM ON DISTRIBUTED OBJECTS AND APPL ICATIONS, PROCEEDINGS, 2000, : 27 - 35
  • [9] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [10] Novel rekeying approach for secure multiple multicast groups over wireless mobile networks
    Mapoka, Trust Tshepo
    Shepherd, Simon
    Abd-Alhameed, Raed
    Anoh, Kelvin O. O.
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 839 - 844