Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
回上頁
切換:
標籤
|
MARC模式
|
ISBD
Key management in mobile ad hoc netw...
~
Florida Atlantic University.
Key management in mobile ad hoc networks.
紀錄類型:
書目-電子資源 : 單行本
Title/Author:
Key management in mobile ad hoc networks./
Author:
Wu, Bing.
Description:
138 p.
Notes:
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3249.
Contained By:
Dissertation Abstracts International67-06B.
Subject:
Computer Science. -
Online resource:
Download PDF (下載PDF全文)
ISBN:
9780542765575
Key management in mobile ad hoc networks.
Wu, Bing.
Key management in mobile ad hoc networks.
- 138 p.
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3249.
Thesis (Ph.D.)--Florida Atlantic University, 2006.
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
ISBN: 9780542765575Subjects--Topical Terms:
1000005419
Computer Science.
Key management in mobile ad hoc networks.
LDR
:03474nmm 2200289 4500
001
1000004897
005
20070601084726.5
008
070601s2006 eng d
020
$a
9780542765575
035
$a
(UnM)AAI3223345
035
$a
AAI3223345
040
$a
UnM
$c
UnM{me_controlnum}
100
1
$a
Wu, Bing.
$3
1000006041
245
1 0
$a
Key management in mobile ad hoc networks.
300
$a
138 p.
500
$a
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3249.
500
$a
Adviser: Jie Wu.
502
$a
Thesis (Ph.D.)--Florida Atlantic University, 2006.
520
$a
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology.
520
$a
We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k.
520
$a
Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
590
$a
School code: 0119.
650
4
$a
Computer Science.
$3
1000005419
690
$a
0984
710
2 0
$a
Florida Atlantic University.
$3
1000006042
773
0
$t
Dissertation Abstracts International
$g
67-06B.
790
1 0
$a
Wu, Jie,
$e
advisor
790
$a
0119
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3223345
$z
Download PDF (下載PDF全文)
0 based onreview(s)
Location:
全部
線上資料庫 (Online Resource)
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Barcode Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
OE0000872
線上資料庫 (Online Resource)
線上資源
線上電子書
OE
一般(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Save to Personal ReadLists
Export a biliographic
pickup library
Processing
...
Change password
Login