ID-based multicast key distribution scheme for mobile Ad hoc networks

Songhee Lee, Keun Ho Lee, Jeong Beom Kim, Sang-Geun Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In this paper, we address efficient multic ast key distribution for dynamic ad hoc network group. We propose scheme that multicasts keys providing security services for multicast, such as authentication, traffic integrity and confidentiality, when members changes. Our new schemes distribute into group key efficiently in dynamic group network. Unlike existing key distribution, our proposed scheme use ID-based public key pair. This can lead to huge savings in bandwidth and reduce overhead of computation in re-key. We also save computation time, since no verification of a certificate is necessary. In this work, therefore, we offer how to the CBT multicast protocol can provide for the secure joining and leaving of a CBT multicast group tree. Finally, the scheme that we proposed can provide a scalable and efficiency for key distribution of ad hoc network.

    Original languageEnglish
    Title of host publicationProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Sytems
    EditorsT. Gonzalez
    Pages489-493
    Number of pages5
    Edition1
    Publication statusPublished - 2003
    EventProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems - Marina del Rey, CA, United States
    Duration: 2003 Nov 32003 Nov 5

    Publication series

    NameProceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
    Number1
    Volume15

    Other

    OtherProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems
    Country/TerritoryUnited States
    CityMarina del Rey, CA
    Period03/11/303/11/5

    Keywords

    • Ad hoc
    • Id-based Cryptography
    • Key distribution

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'ID-based multicast key distribution scheme for mobile Ad hoc networks'. Together they form a unique fingerprint.

    Cite this