References
- D.I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communication Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
- H. Chan and A. Perrig, "Security and privacy in sensor networks, Computer," vol. 36, no. 10, pp. 103-105, Oct. 2003.
- Q. Yu and C. N. Zhang, "A Secure Multicast Scheme for Wireless Sensor Networks," Mobile, Ubiquitus, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on, pp. 158-163, June 2012.
- Q. Yu and C. N. Zhang. "A Lightweight Secure Data Transmission Protocol for Resource Constrained Devices," Security and Communication Networks, John Wiley and Sons, Volume 3, Issue 5, pp 362-370, 2010.
- Q. Yang and Y. Desmedt, "Secure Communication in Multicast Graphs," Proceedings of 17th International Conference on the Theory and Application of Cryptology and Information Security, pp. 538-555, December 2011.
- G. Zeng, B. Wang, Y. Ding, L. Xiao, M. W. Mutka, "Effient multicast algorithms for multichannel wireless mesh networks," IEEE Transactions on Parallel and Distributed Systems 21(1) pp. 86-99, 2010. https://doi.org/10.1109/TPDS.2009.46
- G. Kwon and J. Byers, "Roma: Reliable overlay multicast with loosely coupled TCP connections," In Proceedings of IEEE INFOCOM 2004.
- R. Varalakshmi,and V. Rhymend Uthariaraj, "A New Secure Multicast Key Distribution Scheme Using Tabulation Method," International Journal of Information Technology and Computer Science, Vol. 4, No. 1, pp. 32-39, February 2012.
- A. Ballardie, "Scalable multicast key distribution, Network Working Group," RFC 1949, May 1996.
- B. Briscoe, "Marks : Zero side effect multicast key management using arbitrarily revealed key sequences," In 1st International Workshop on Networked Group Communication, Pisa, Italy, November 1999, November 1999.
- I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key management for secure internet multicasting boolean function minimization techniques," In Proceeding of IEEE INFOCOM, New York, March 1999.
- E. Harder, D. Wallner, and R. Agee, "Key management for multicast: Issues and architectures," RFC 2627, IETF, June 1999.
- H. Harney and C. Muckenhirn, "Group key management protocol (gkmp) architecture," Request for Comments (Experimental) 2094, Internet Engineering Task Force, July 1997.
- S. Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of ACM SIGCOMM Computer Communication Review, vol.27, no.4, pp.277-288, 1977.
- M. Naor, D. Naor, and L. Lotspiech, "Revocation and tracing schemes for stateless receivers," In Proceedings of Crypto 2001, 2001.
- C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM, September 1998.
- A.P. Singh, S. M. Potey, F. A. Barbhuiya and S. Nandi, "A Scalable and Secure Key Distribution Mechanism for Multicast Networks," Advances in Computing and Communications (ICACC), 2012 International Conference on, pp. 211-214, Aug. 2012.
- K. Gomathi and B. Parvathavarthini, "An efficient cluster based key management scheme for manet with authentication," In Trendz in Information Sciences Computing (TISC), 2010, pp. 202-205, Dec. 2010.
- J. Byers, J. Considine, G. Itkis, M. Cheng, and A. Yeung, "Securing bulk content almost for free," Computer Communications, vol.29, no.3, pp. 280-290, February 2006. https://doi.org/10.1016/j.comcom.2004.12.007
- D. Balenson, D. McGrew, and A. "Sherman, Key management for large dynamic groups: One-way function trees and amortized initialization," Draft-balenson-groupkeymgmt-oft-00.txt, IETF, Feb. 1999.
- J. Byers, M. Luby, and M. Mitzenmacher, "A digital fountain approach to asynchronous reliable multicast," IEEE Journal on Selected Areas in Communications, vol.20, no.8, pp.1528-1540, 2002. https://doi.org/10.1109/JSAC.2002.803996
- M. Luby, "LT codes," In Proceedings of 43rd symposium on Foundations of Computer Science, November 2001.
- M. Luby, M. Mitzenmacher, "A. Shokrollahi, and D. Spielman, Efficient erasure correction codes," IEEE Transactions on Information Theory, vol.47, no.2, 2001.
- P. Maymounkov and D. Mazieres, "Relateless codes and big downloads," In Proceedings of 2nd International Workshop on Peer-to-Peer Systems, February 2003.
- Q. Shuang, G. Feng and Y. Zhang, "Cooperative Communications for Reliable Data Transport with Fountain Codes," Journal of Communications 5, no. 4, pp. 340-347, 2010.
- R. L. Rivest, "All-or-nothing encryption," In Proceedings Fast Software Encryption, pp. 210-218, 1997.
- R. Bhatia and Li Erran Li. Characterizing achievable multicast rates in multi-hop wireless networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM, 2005.
- S. Ni, Y. Tseng, Y. Chen, and J. Sheu. "The broadcast storm problem in a mobile ad hoc network". In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '99), pp.151-162.
- HC. Lim, TH. Park, and GI. Kwon, " Mutual Authentication Protocol based on the Random Divided Session for the Security of Medical Information in Home-Health," Journal of the Korea Society of Computer and Information, 17(10):79-88, 2012. https://doi.org/10.9708/jksci/2012.17.10.079