{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T14:54:18Z","timestamp":1773240858270,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T00:00:00Z","timestamp":1493337600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science and Innovation, Malaysia","award":["01-01-03-SF0786"],"award-info":[{"award-number":["01-01-03-SF0786"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11276-017-1511-4","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T09:24:27Z","timestamp":1493371467000},"page":"3009-3027","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Host mobility key management in dynamic secure group communication"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8746-9714","authenticated-orcid":false,"given":"Babak","family":"Daghighi","sequence":"first","affiliation":[]},{"given":"Miss Laiha","family":"Mat Kiah","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Muhammad Habib Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,28]]},"reference":[{"key":"1511_CR1","unstructured":"Cisco Visual Networking Index. (2016). Global mobile data traffic forecast update, 2015\u20132020. Cisco white paper: Cisco systems."},{"issue":"1","key":"1511_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2427036.2427046","volume":"43","author":"A Sathiaseelan","year":"2012","unstructured":"Sathiaseelan, A., & Crowcroft, J. (2012). Internet on the move: Challenges and solutions. ACM SIGCOMM Computer Communication Review, 43(1), 51\u201355. doi: 10.1145\/2427036.2427046 .","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"2","key":"1511_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MNET.2013.6485095","volume":"27","author":"Y Shin","year":"2013","unstructured":"Shin, Y., Choi, M., Koo, J., & Choi, S. (2013). Video multicast over WLANs: Power saving and reliability perspectives. Network IEEE, 27(2), 40\u201346. doi: 10.1109\/MNET.2013.6485095 .","journal-title":"Network IEEE"},{"issue":"1","key":"1511_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.tele.2010.05.006","volume":"28","author":"A Holzer","year":"2011","unstructured":"Holzer, A., & Ondrus, J. (2011). Mobile application market: A developer\u2019s perspective. Telematics and Informatics, 28(1), 22\u201331. doi: 10.1016\/j.tele.2010.05.006 .","journal-title":"Telematics and Informatics"},{"issue":"4","key":"1511_CR5","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.csi.2008.09.016","volume":"31","author":"YF Chang","year":"2009","unstructured":"Chang, Y. F., Chen, C. S., & Zhou, H. (2009). Smart phone for mobile commerce. Computer Standards and Interfaces, 31(4), 740\u2013747. doi: 10.1016\/j.csi.2008.09.016 .","journal-title":"Computer Standards and Interfaces"},{"issue":"2","key":"1511_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/78952.78953","volume":"8","author":"SE Deering","year":"1990","unstructured":"Deering, S. E., & Cheriton, D. R. (1990). Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems, 8(2), 85\u2013110. doi: 10.1145\/78952.78953 .","journal-title":"ACM Transactions on Computer Systems"},{"key":"1511_CR7","unstructured":"Cisco Systems (2012). Internet protocol multicast. http:\/\/docwiki.cisco.com\/wiki\/Internet_Protocol_Multicast . Accessed 15 Aug 2016."},{"issue":"5","key":"1511_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/mwc.2007.4396938","volume":"14","author":"P Sakarindr","year":"2007","unstructured":"Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. Wireless Communications IEEE, 14(5), 8\u201320. doi: 10.1109\/mwc.2007.4396938 .","journal-title":"Wireless Communications IEEE"},{"issue":"1","key":"1511_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/mnet.2003.1174175","volume":"17","author":"P Judge","year":"2003","unstructured":"Judge, P., & Ammar, M. (2003). Security issues and solutions in multicast content distribution: a survey. Network IEEE, 17(1), 30\u201336. doi: 10.1109\/mnet.2003.1174175 .","journal-title":"Network IEEE"},{"key":"1511_CR10","unstructured":"Martin, J., & Haberman, B. (2008). Internet Group Management Protocol Version 3 (IGMPv3)\/Multicast Listener Discovery Version 2 (MLDv2) and Multicast Routing Protocol Interaction. Internet Engineering Task Force."},{"key":"1511_CR11","doi-asserted-by":"crossref","unstructured":"Savola, P. (2008). Overview of the internet multicast routing architecture. RFC5110. Internet Engineering Task Force.","DOI":"10.17487\/rfc5110"},{"issue":"3","key":"1511_CR12","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/COMST.2007.4317616","volume":"9","author":"M Hosseini","year":"2007","unstructured":"Hosseini, M., Ahmed, D. T., Shirmohammadi, S., & Georganas, N. D. (2007). A survey of application-layer multicast protocols. Communications Surveys and Tutorials IEEE, 9(3), 58\u201374.","journal-title":"Communications Surveys and Tutorials IEEE"},{"issue":"1","key":"1511_CR13","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"HL Nguyen","year":"2008","unstructured":"Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32\u201346.","journal-title":"Ad Hoc Networks"},{"key":"1511_CR14","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","volume":"74","author":"S Iqbal","year":"2016","unstructured":"Iqbal, S., Mat Kiah, M. L., Daghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98\u2013120. doi: 10.1016\/j.jnca.2016.08.016 .","journal-title":"Journal of Network and Computer Applications"},{"key":"1511_CR15","doi-asserted-by":"crossref","unstructured":"Baugher, M., Canetti, R., Dondeti, L., & Lindholm, F. (2005). Multicast Security (MSEC) Group Key Management Architecture. RFC 4046. Internet Engineering Task Force.","DOI":"10.17487\/rfc4046"},{"issue":"7","key":"1511_CR16","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905\u2013921.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"1511_CR17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., & Tsudik, G. (2004). Tree-based group key agreement. ACM Transactions on Information and System Security, 7(1), 60\u201396.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"1511_CR18","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309\u2013329.","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"1511_CR19","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1049\/iet-ifs.2009.0261","volume":"4","author":"P Sakarindr","year":"2010","unstructured":"Sakarindr, P., & Ansari, N. (2010). Survey of security services on group communications. Information Security IET, 4(4), 258\u2013272. doi: 10.1049\/iet-ifs.2009.0261 .","journal-title":"Information Security IET"},{"key":"1511_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2014.11.001","volume":"50","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Mat Kiah, M. L., Shamshirband, S., & Rehman, M. H. U. (2015). Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications, 50, 1\u201314. doi: 10.1016\/j.jnca.2014.11.001 .","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"1511_CR21","first-page":"105","volume":"2","author":"Y Challal","year":"2005","unstructured":"Challal, Y., & Seba, H. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(1), 105\u2013118.","journal-title":"International Journal of Information Technology"},{"issue":"1","key":"1511_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"W Chung Kei","year":"2000","unstructured":"Chung Kei, W., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. Networking IEEE\/ACM Transactions on, 8(1), 16\u201330. doi: 10.1109\/90.836475 .","journal-title":"Networking IEEE\/ACM Transactions on"},{"issue":"2","key":"1511_CR23","first-page":"142","volume":"7","author":"S Gharout","year":"2008","unstructured":"Gharout, S., Challal, Y., & Bouabdallah, A. (2008). Scalable delay-constrained multicast group key management. International Journal of Network Security, 7(2), 142\u2013156.","journal-title":"International Journal of Network Security"},{"key":"1511_CR24","doi-asserted-by":"publisher","unstructured":"Mat Kiah, M. L., & Martin, K. M. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In Proceedings of the future generation communication and networking 2007 (Vol. 01, pp. 100\u2013107): IEEE Computer Society. doi: 10.1109\/FGCN.2007.144 .","DOI":"10.1109\/FGCN.2007.144"},{"issue":"2","key":"1511_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/997150.997157","volume":"34","author":"Y Challal","year":"2004","unstructured":"Challal, Y., Bettahar, H., & Bouabdallah, A. (2004). SAKM: A scalable and adaptive key management approach for multicast communications. ACM SIGCOMM Computer Communication Review, 34(2), 55\u201370. doi: 10.1145\/997150.997157 .","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"1511_CR26","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2003.11.003","volume":"23","author":"KA Heba","year":"2004","unstructured":"Heba, K. A. (2004). A scalable and distributed multicast security protocol using a subgroup-key hierarchy. Computers and Security, 23(4), 320\u2013329. doi: 10.1016\/j.cose.2003.11.003 .","journal-title":"Computers and Security"},{"key":"1511_CR27","doi-asserted-by":"crossref","unstructured":"Schmidt, T., Waehlisch, M., & Fairhurst, G. (2010). Multicast mobility in mobile IP version 6 (MIPv6): problem statement and brief survey. RFC 5757. Internet Engineering Task Force.","DOI":"10.17487\/rfc5757"},{"issue":"1","key":"1511_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/comst.2004.5342232","volume":"6","author":"I Romdhani","year":"2004","unstructured":"Romdhani, I., Kellil, M., Hong-Yon, L., Bouabdallah, A., & Bettahar, H. (2004). IP mobile multicast: Challenges and solutions. Communications Surveys and Tutorials IEEE, 6(1), 18\u201341. doi: 10.1109\/comst.2004.5342232 .","journal-title":"Communications Surveys and Tutorials IEEE"},{"issue":"1","key":"1511_CR29","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.jnca.2011.09.001","volume":"35","author":"I Al-Surmi","year":"2012","unstructured":"Al-Surmi, I., Othman, M., & Mohd Ali, B. (2012). Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. Journal of Network and Computer Applications, 35(1), 295\u2013315. doi: 10.1016\/j.jnca.2011.09.001 .","journal-title":"Journal of Network and Computer Applications"},{"key":"1511_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.05.008","volume":"72","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Mat Kiah, M. L., Shamshirband, S., Iqbal, S., & Asghari, P. (2015). Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Computer Communications, 72, 1\u201316. doi: 10.1016\/j.comcom.2015.05.008 .","journal-title":"Computer Communications"},{"issue":"6","key":"1511_CR31","first-page":"874","volume":"18","author":"S Gharout","year":"2012","unstructured":"Gharout, S., Bouabdallah, A., Challal, Y., & Achemlal, M. (2012). Adaptive group key management protocol for wireless communications. Journal of Universal Computer Science, 18(6), 874\u2013898.","journal-title":"Journal of Universal Computer Science"},{"key":"1511_CR32","unstructured":"Wallner, D., Harder, E., & Agee, R. (1999). Key Management for Multicast: Issues and Architectures. RFC 2627.: Internet Engineering Task Force."},{"issue":"6","key":"1511_CR33","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TNET.2007.897955","volume":"15","author":"S Yan","year":"2007","unstructured":"Yan, S., & Liu, K. J. R. (2007). Hierarchical group access control for secure multicast communications. Networking IEEE\/ACM Transactions on, 15(6), 1514\u20131526.","journal-title":"Networking IEEE\/ACM Transactions on"},{"issue":"5","key":"1511_CR34","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1109\/TC.2007.1022","volume":"56","author":"WHD Ng","year":"2007","unstructured":"Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007). Dynamic balanced key tree management for secure Multicast communications. Computers IEEE Transactions on, 56(5), 590\u2013605.","journal-title":"Computers IEEE Transactions on"},{"issue":"1","key":"1511_CR35","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.csi.2007.11.005","volume":"31","author":"JC Lin","year":"2009","unstructured":"Lin, J. C., Huang, K. H., Lai, F., & Lee, H. C. (2009). Secure and efficient group key management with shared key derivation. Computer Standards and Interfaces, 31(1), 192\u2013208.","journal-title":"Computer Standards and Interfaces"},{"issue":"2","key":"1511_CR36","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2009.08.007","volume":"33","author":"D-H Je","year":"2010","unstructured":"Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33(2), 136\u2013148. doi: 10.1016\/j.comcom.2009.08.007 .","journal-title":"Computer Communications"},{"key":"1511_CR37","doi-asserted-by":"publisher","unstructured":"Steiner, M., Tsudik, G., & Waidner, M. Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM conference on Computer and communications security, New Delhi, India, 1996 (pp. 31\u201337): ACM. doi: 10.1145\/238168.238182 .","DOI":"10.1145\/238168.238182"},{"issue":"3","key":"1511_CR38","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TDSC.2005.39","volume":"2","author":"Y Amir","year":"2005","unstructured":"Amir, Y., Nita-Rotaru, C., Stanton, S., & Tsudik, G. (2005). Secure spread: An integrated architecture for secure group communication. Dependable and Secure Computing IEEE Transactions on, 2(3), 248\u2013261.","journal-title":"Dependable and Secure Computing IEEE Transactions on"},{"issue":"1","key":"1511_CR39","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comnet.2006.03.008","volume":"51","author":"S Zheng","year":"2007","unstructured":"Zheng, S., Manz, D., & Alves-Foss, J. (2007). A communication-computation efficient group key algorithm for large and dynamic groups. Computer Networks, 51(1), 69\u201393. doi: 10.1016\/j.comnet.2006.03.008 .","journal-title":"Computer Networks"},{"key":"1511_CR40","doi-asserted-by":"crossref","unstructured":"Magliveras, S., Wandi, W., & Xukai, Z. (2008). Notes on the CRTDH Group Key Agreement Protocol. Paper presented at the Distributed Computing Systems Workshops, 2008. ICDCS \u201808. 28th International Conference on","DOI":"10.1109\/ICDCS.Workshops.2008.36"},{"issue":"1","key":"1511_CR41","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.jnca.2010.05.001","volume":"34","author":"E Konstantinou","year":"2011","unstructured":"Konstantinou, E. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384\u2013393.","journal-title":"Journal of Network and Computer Applications"},{"issue":"10","key":"1511_CR42","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1016\/j.jpdc.2012.06.004","volume":"72","author":"X Lv","year":"2012","unstructured":"Lv, X., Li, H., & Wang, B. (2012). Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing, 72(10), 1195\u20131200. doi: 10.1016\/j.jpdc.2012.06.004 .","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1511_CR43","unstructured":"Hardjono, T., Cain, B., & Monga, I. (2000). Intra-Domain Group Key Management Protocol. http:\/\/tools.ietf.org\/html\/draft-irtf-smug-intragkm-00 ."},{"issue":"4","key":"1511_CR44","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/263109.263179","volume":"27","author":"S Mittra","year":"1997","unstructured":"Mittra, S. (1997). Iolus: A framework for scalable secure multicasting. SIGCOMM Computer Communication Review, 27(4), 277\u2013288.","journal-title":"SIGCOMM Computer Communication Review"},{"issue":"17","key":"1511_CR45","doi-asserted-by":"publisher","first-page":"4727","DOI":"10.1016\/j.comnet.2007.07.007","volume":"51","author":"A Nemaney Pour","year":"2007","unstructured":"Nemaney Pour, A., Kumekawa, K., Kato, T., & Itoh, S. (2007). A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Computer Networks, 51(17), 4727\u20134743. doi: 10.1016\/j.comnet.2007.07.007 .","journal-title":"Computer Networks"},{"issue":"5","key":"1511_CR46","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.peva.2007.07.002","volume":"65","author":"J-H Cho","year":"2008","unstructured":"Cho, J.-H., Chen, I.-R., & Wang, D.-C. (2008). Performance optimization of region-based group key management in mobile ad hoc networks. Performance Evaluation, 65(5), 319\u2013344. doi: 10.1016\/j.peva.2007.07.002 .","journal-title":"Performance Evaluation"},{"issue":"8","key":"1511_CR47","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.future.2008.03.007","volume":"24","author":"JH Li","year":"2008","unstructured":"Li, J. H., Bhattacharjee, B., Yu, M., & Levy, R. (2008). A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems, 24(8), 860\u2013869. doi: 10.1016\/j.future.2008.03.007 .","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"1511_CR48","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1504\/IJSN.2008.017226","volume":"3","author":"Y Challal","year":"2008","unstructured":"Challal, Y., Gharout, S., Bouabdallah, A., & Bettahar, H. (2008). Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks, 3(2), 133\u2013146.","journal-title":"International Journal of Security and Networks"},{"key":"1511_CR49","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1587\/transcom.E92.B.632","volume":"92","author":"J Hur","year":"2009","unstructured":"Hur, J., & Yoon, H. (2009). A decentralized multi-group key management scheme. IEICE Transactions on Communications, 92, 632\u2013635.","journal-title":"IEICE Transactions on Communications"},{"key":"1511_CR50","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2014.03.013","volume":"42","author":"A Mehdizadeh","year":"2014","unstructured":"Mehdizadeh, A., Hashim, F., & Othman, M. (2014). Lightweight decentralized multicast\u2013unicast key management method in wireless IPv6 networks. Journal of Network and Computer Applications, 42, 59\u201369. doi: 10.1016\/j.jnca.2014.03.013 .","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"1511_CR51","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11276-006-4600-3","volume":"13","author":"E Hyyti\u00e4","year":"2007","unstructured":"Hyyti\u00e4, E., & Virtamo, J. (2007). Random waypoint mobility model in cellular networks. Wireless Networks, 13(2), 177\u2013188. doi: 10.1007\/s11276-006-4600-3 .","journal-title":"Wireless Networks"},{"key":"1511_CR52","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.pmcj.2014.12.008","volume":"21","author":"Z Narmawala","year":"2015","unstructured":"Narmawala, Z., & Srivastava, S. (2015). Community aware heterogeneous human mobility (CAHM): Model and analysis. Pervasive and Mobile Computing, 21, 119\u2013132. doi: 10.1016\/j.pmcj.2014.12.008 .","journal-title":"Pervasive and Mobile Computing"},{"key":"1511_CR53","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1109\/ACCESS.2016.2600526","volume":"4","author":"J Wang","year":"2016","unstructured":"Wang, J., Jiang, C., Quek, T. Q. S., Wang, X., & Ren, Y. (2016). The value strength aided information diffusion in socially-aware mobile networks. IEEE Access, 4, 3907\u20133919. doi: 10.1109\/ACCESS.2016.2600526 .","journal-title":"IEEE Access"},{"issue":"2","key":"1511_CR54","doi-asserted-by":"crossref","first-page":"4430","DOI":"10.3390\/s150204430","volume":"15","author":"M Habib ur Rahman","year":"2015","unstructured":"Habib ur Rahman, M., Liew, C. S., Wah, T. Y., Shuja, J., & Daghighi, B. (2015). Mining personal data using smartphones and wearable devices: A survey. Sensors, 15(2), 4430\u20134469.","journal-title":"Sensors"},{"issue":"2","key":"1511_CR55","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.pmcj.2005.11.003","volume":"2","author":"J Cao","year":"2006","unstructured":"Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187\u2013203.","journal-title":"Pervasive and Mobile Computing"},{"key":"1511_CR56","doi-asserted-by":"crossref","unstructured":"Pietro, R. D., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. Paper presented at the Proceedings of the second ACM international workshop on Principles of mobile computing, Toulouse, France.","DOI":"10.1145\/584490.584504"},{"key":"1511_CR57","doi-asserted-by":"publisher","unstructured":"Jong-Hyuk, R., & Kyoon-Ha, L. (2006). Key management scheme for providing the confidentiality in mobile multicast. In Advanced communication technology, 2006. ICACT 2006. The 8th international conference, 20-22 Feb. 2006 2006 (Vol. 2, pp. 1205\u20131209). doi: 10.1109\/icact.2006.206187 .","DOI":"10.1109\/icact.2006.206187"},{"key":"1511_CR58","doi-asserted-by":"crossref","unstructured":"Kamat, S., Parimi, S., & Agrawal, D. P. Reduction in control overhead for a secure, scalable framework for mobile multicast. In, 2003 (Vol. 1, pp. 98\u2013103 vol. 101): IEEE","DOI":"10.1109\/ICC.2003.1204150"},{"key":"1511_CR59","doi-asserted-by":"crossref","unstructured":"DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., et al. (2001). Secure group communications for wireless networks. Paper presented at the Military Communications Conference, (MILCOM 2001).","DOI":"10.1109\/MILCOM.2001.985773"},{"key":"1511_CR60","doi-asserted-by":"crossref","unstructured":"Gharout, S., Bouabdallah, A., Kellil, M., & Challal, Y. (2010). Key management with host mobility in dynamic groups. Paper presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation.","DOI":"10.1145\/1854099.1854138"},{"issue":"6","key":"1511_CR61","doi-asserted-by":"crossref","first-page":"850","DOI":"10.7763\/IJCEE.2012.V4.618","volume":"4","author":"MLM Kiah","year":"2012","unstructured":"Kiah, M. L. M., & Daghighi, B. (2012). An implementation of secure group communication in a wireless environment. International Journal of Computer and Electrical Engineering, 4(6), 850.","journal-title":"International Journal of Computer and Electrical Engineering"},{"issue":"6","key":"1511_CR62","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/90.650139","volume":"5","author":"S Floyd","year":"1997","unstructured":"Floyd, S., Jacobson, V., Liu, C.-G., McCanne, S., & Zhang, L. (1997). A reliable multicast framework for light-weight sessions and application level framing. IEEE\/ACM Transactions on Networking, 5(6), 784\u2013803. doi: 10.1109\/90.650139 .","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1511_CR63","doi-asserted-by":"publisher","unstructured":"Srinivas, V., & Lu, R. An efficient reliable multicast protocol for 802.11-based wireless LANs. In world of wireless, mobile and multimedia networks & workshops, 2009. WoWMoM 2009. IEEE international symposium on a, 15-19 June 2009 2009 (pp. 1\u20136). doi: 10.1109\/WOWMOM.2009.5282455 .","DOI":"10.1109\/WOWMOM.2009.5282455"},{"key":"1511_CR64","unstructured":"Frankel, S., & Kelly, S. G. (2007). Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Internet Engineering Task Force."},{"key":"1511_CR65","doi-asserted-by":"crossref","unstructured":"Almeroth, K. C., & Ammar, M. H. Collecting and modeling the join\/leave behavior of multicast group members in the mbone. In high performance distributed computing, 1996., proceedings of 5th IEEE international symposium on, 1996 (pp. 209\u2013216): IEEE","DOI":"10.1109\/HPDC.1996.546190"},{"issue":"6","key":"1511_CR66","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/35.587716","volume":"35","author":"KC Almeroth","year":"1997","unstructured":"Almeroth, K. C., & Ammar, M. H. (1997). Multicast group behavior in the Internet\u2019s multicast backbone (MBone). Communications Magazine IEEE, 35(6), 124\u2013129.","journal-title":"Communications Magazine IEEE"},{"key":"1511_CR67","volume-title":"Probability, stochastic processes, and queueing theory: the mathematics of computer performance modeling","author":"R Nelson","year":"2013","unstructured":"Nelson, R. (2013). Probability, stochastic processes, and queueing theory: the mathematics of computer performance modeling. Berlin: Springer."},{"key":"1511_CR68","doi-asserted-by":"crossref","DOI":"10.1002\/0471791571","volume-title":"Queueing networks and Markov chains: modeling and performance evaluation with computer science applications","author":"G Bolch","year":"2006","unstructured":"Bolch, G., Greiner, S., de Meer, H., & Trivedi, K. S. (2006). Queueing networks and Markov chains: modeling and performance evaluation with computer science applications. Hoboken: Wiley."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-017-1511-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1511-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1511-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:03:58Z","timestamp":1750208638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-017-1511-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,28]]},"references-count":68,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1511"],"URL":"https:\/\/doi.org\/10.1007\/s11276-017-1511-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,28]]}}}