A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study

QSpace/Manakin Repository

A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study

Show simple item record


dc.contributor.author Rong, Bo
dc.contributor.author Chen, Hsiao-Hwa
dc.contributor.author Qian, Yi
dc.contributor.author Lu, Kejie
dc.contributor.author Qingyang Hu, Rose
dc.contributor.author Guizani, S.
dc.date.accessioned 2009-12-27T09:09:47Z
dc.date.available 2009-12-27T09:09:47Z
dc.date.issued 2009-01-01
dc.identifier.citation Volume 58, Issue 1, Jan. 2009 Page(s):398 - 408 en_US
dc.identifier.uri http://dx.doi.org/10.1109/TVT.2008.923666
dc.identifier.uri http://hdl.handle.net/10576/10481
dc.description.abstract In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast service must be provided to efficiently and safely exchange data among nodes. The existing literature has extensively studied security protection for a single multicast group, in which all nodes are assumed to have the same security level. However, such an assumption may not be valid in practice because, for many applications, different users can play different roles and thus naturally be classified into multiple security levels. In this paper, we propose a pyramidal security model to safeguard the multisecurity-level information sharing in one cooperation domain. As a prominent feature, a pyramidal security model contains a set of hierarchical security groups and multicast groups. To find an efficient key management solution that covers all the involved multicast groups, we develop the following three schemes for the proposed security model: (1) separated star key graph; (2) separated tree key graph, and (3) integrated tree key graph. Performance comparison demonstrates that the scheme of integrated tree key graph has advantages over its counterparts. en_US
dc.language.iso en en_US
dc.subject pyramidal security model en_US
dc.subject multicast en_US
dc.subject network (MANET) en_US
dc.subject Group-oriented computing en_US
dc.subject Mobile ad hoc network en_US
dc.subject group-oriented computing en_US
dc.subject key management en_US
dc.subject mobile ad hoc en_US
dc.title A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study en_US
dc.type Article en_US

Files in this item

Files Size Format View Description
Key Management Study.pdf 776.6Kb PDF View/Open A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study

This item appears in the following Collection(s)

Show simple item record

Search QSpace


Advanced Search

Browse

My Account