Group Rekeying Approach for Group Communication
نویسندگان
چکیده
منابع مشابه
Scalable balanced batch rekeying for secure group communication
Secure group communication is important for applications such as pay-per-view. Other authors have proposed the key tree approach to distribute a shared group key in a way such that the rekeying cost scales linearly with the logarithm of the group size for a join or depart request. The efficiency of the key tree approach depends critically on whether the key tree remains balanced. Periodic rebal...
متن کاملReducing Overhead on Double Rekeying in Secure Group Communication
Nowadays networks require flexible dynamic group communication with the internet. When we develop these systems on multicast communication framework, various types of security threat occurs .As a result construction of secure group communication that protects users from intrusion and eavesdropping are very important. In this paper, we propose an efficient key distribution method for a secure gr...
متن کاملReducing Frequency of Group Rekeying Operation
In the past, Ad-hoc networks were used in limited areas which require secure group communication without Internet access, such as the army or emergencies. However, Ad-hoc networks currently are widely used in variety applications like group chat, smart applications, research testbed etc. Ad-hoc network is basically group based network in the absence of access point so it is prevalent to provide...
متن کاملGroup rekeying with limited unicast recovery
In secure group communications, a key server can deliver a “group-oriented” rekey message [16] to a large number of users efficiently using IP multicast. For reliable delivery, Keystone [17] proposed the use of forward error correction (FEC) in an initial multicast, followed by the use of unicast delivery for users that cannot recover their new keys from the multicast. In this paper, we investi...
متن کاملGroup rekeying with limited unicast recovery q
In secure group communications, a key server can deliver a ‘‘group-oriented’’ rekey message [C.K. Wong, M.G. Gouda, S.S. Lam, Secure group communications using key graphs, in: Proceedings of ACM SIGCOMM 98, September 1998, pp. 68–79] to a large number of users efficiently using multicast. For reliable delivery, Keystone [C.K. Wong, S.S. Lam, Keystone: a group key management system, in: Proceedi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2008
ISSN: 1812-5638
DOI: 10.3923/itj.2008.1081.1084