A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks (original) (raw)
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
References
- IEEE 802.16 Work Group. (2009). IEEE Std 802.16: Air interface for broadband wireless access systems and revision of IEEE Std 802.16-2004.
- IEEE 802.16 Work Group. (2006). IEEE Std 802.16e: Air interface for fixed and mobile broadband wireless access systems, Amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands and amendment and corrigendum to IEEE Std 802.16-2004.
- Hardjono, T., & Dondeti, L. R. (2003). Multicast and group security. USA.
- Sadeghi, M. M. G., et al. (2013). Key management in mobile WiMAX networks. In Selected topics in WiMAX. InTech.
- Naseer, S., et al. (2008). Vulnerabilities exposing IEEE 802.16e networks to DoS attacks: A survey. In Ninth ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD ‘08), Thailand (pp. 344–349).
- Li, H., et al. (2006). GKDA: A group-based key distribution algorithm for WiMAX MBS security. In Advances in multimedia information processing, LNCS (vol. 4261, pp. 310–318). Springer.
- Kambourakis, G., et al. (2010). Revisiting WiMAX MBS security. Computers & Mathematics with Applications, 60(2), 217–223.
Article Google Scholar - Huang, C. T., & Chang, J. M. (2008). Responding to security issues in WiMAX networks. IEEE IT Professional, 10(5), 15–21.
Article Google Scholar - Brown, J., et al. (2009). Efficient rekeying algorithms for WiMAX networks. Security and Communication Networks, 2(5), 392–400.
Article Google Scholar - Chakraborty, S., et al. (2011). A scalable rekeying scheme for secure multicast in IEEE 802.16 network. Communications in Computer and Information Science, 132(2), 471–481.
Google Scholar - Xu, S., et al. (2008). Secure multicast in WiMAX. Journal of Networks, 3(2), 48–57.
Article Google Scholar - Sadeghi, M. M. G., et al. (2014). Scalable and efficient key management for mobile WiMAX networks. International Journal of Communication Systems, 27(10), 2166–2189.
Article Google Scholar - Store, J. A. (2001). An introduction to data structures and algorithms. Waltham: Birkhauser, Springer.
Google Scholar - Guo, H., et al. (2012). A provably secure authenticated key agreement protocol for wireless communications. Computers & Electrical Engineering, 38(3), 563–572.
Article MathSciNet MATH Google Scholar - Mehdizadeh, A., et al. (2014). Performance evaluation of cost-effective multicast–unicast key management method. Wireless Personal Communications, 77(3), 2195–2212.
- Kolias, C., et al. (2013). Attacks and countermeasures on 802.16: Analysis and assessment. IEEE Communications Surveys and Tutorials, 15(1), 487–514.
Article Google Scholar - He, X., et al. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.
Article Google Scholar - Ni, L., et al. (2011). Strongly secure identity-based authenticated key agreement protocols. Computers & Electrical Engineering, 37(2), 205–217.
Article MATH Google Scholar - Zhou, J., et al. (2013). Autonomic group key management in deep space DTN. Wireless Personal Communications, 77(1), 269–287.
- Lv, C., et al. (2013). An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications, 36(1), 498–503.
Article MathSciNet Google Scholar - Daeinabi, A., & Rahbar, A. G. (2013). An advanced security scheme based on clustering and key distribution in vehicular Ad hoc networks. Computers & Electrical Engineering, 40(2), 517–529.
Article Google Scholar - Huang, C.-T., et al. (2007). Efficient and Secure multicast in WirelessMAN: A cross-layer design. Journal of Communications Software and Systems, 3(3), 199–206.
Google Scholar - Zhu, S., et al. (2003). Performance optimizations for group key management schemes for secure multicast. In 23rd international conference on distributed computing systems (ICDCS), VA, USA, (pp. 163–171).
- Almeroth, K. C., & Ammar, M. H. (1997). Multicast group behavior in the internet’s multicast backbone (MBone). IEEE Communications Magazine, 35(6), 124–129.
Article Google Scholar - Wang, Y., et al. (2008). Efficient key management for secure wireless multicast. In Third 2008 international conference on convergence and hybrid information technology, Busan, (pp. 1131–1136).
- Nelson, R. (1995). Probability, stochastic processes and queueing theory: The mathematics of computer performance modeling. New York: Springer.
Book MATH Google Scholar - Sadeghi, M. M. G., et al. (2011). Scalable rekeying algorithm in IEEE 802.16e. In 17th Asia-Pacific conference on communications (APCC), Sabah, Malaysia, (pp. 726–730).
- Sadeghi, M. M. G., et al. (2013). An energy saving scheme for key management protocol in IEEE802.16e. In IEEE TENCON spring conference, Sydney, Australia (pp. 525–529).
- Bernardo, V., et al. (2011) Towards energy consumption measurement in a cloud computing wireless testbed. In International symposium on network cloud computing and applications, (pp. 91–98).