ID-based multicast key distribution scheme for mobile Ad hoc networks

Songhee Lee, Keun Ho Lee, Jeong Beom Kim, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we address efficient multic ast key distribution for dynamic ad hoc network group. We propose scheme that multicasts keys providing security services for multicast, such as authentication, traffic integrity and confidentiality, when members changes. Our new schemes distribute into group key efficiently in dynamic group network. Unlike existing key distribution, our proposed scheme use ID-based public key pair. This can lead to huge savings in bandwidth and reduce overhead of computation in re-key. We also save computation time, since no verification of a certificate is necessary. In this work, therefore, we offer how to the CBT multicast protocol can provide for the secure joining and leaving of a CBT multicast group tree. Finally, the scheme that we proposed can provide a scalable and efficiency for key distribution of ad hoc network.

Original languageEnglish
Title of host publicationProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Sytems
EditorsT. Gonzalez
Pages489-493
Number of pages5
Edition1
Publication statusPublished - 2003
EventProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems - Marina del Rey, CA, United States
Duration: 2003 Nov 32003 Nov 5

Publication series

NameProceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
Number1
Volume15

Other

OtherProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems
Country/TerritoryUnited States
CityMarina del Rey, CA
Period03/11/303/11/5

Keywords

  • Ad hoc
  • Id-based Cryptography
  • Key distribution

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'ID-based multicast key distribution scheme for mobile Ad hoc networks'. Together they form a unique fingerprint.

Cite this