An Efficient and Secure Multicast Key Management Scheme based on Star Topology

نویسندگان

  • Neha Mittal
  • Vinod Kumar
چکیده

The today’s world relies heavily over the applications, such as e-commerce, which are using the multicast communications, carried out over the insecure channel like internet, henceforth, the need for secure group communication is realized. The secure group communication helps in transmitting data in such a way that only the members of the group are able to receive the message. In 2012, K. Saravanan and T. Purusothaman proposed a scheme for multicast key management in which the group members generated the individual private keys and henceforth, reduced the burden upon the server. However, in some cases, the forward secrecy and backward secrecy may be violated upon member’s leaving and joining the group respectively. In this paper, we proposed an improvement on the SaravananPurusothaman scheme to solve the above problem. The proposed scheme preserves the forward secrecy and backward secrecy in multicast group key management and therefore, is more secure. In addition, it also eliminates the rekeying process whenever a member joins/ leaves a group.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Topology-aware key management schemes for wireless multicast

In secure multicast applications, key management must be employed to provide access control to the multicast content. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating and improving the reliability of key distribution. The topology-matching ...

متن کامل

An efficient key management scheme for secure wireless multicast

In the future, many multicast services will take place in the wireless domain. However, before these services can successfully be deployed, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we present a method for designing multicast key management trees that are suitable for mobile wireless environments. By matching the ...

متن کامل

Asymptotically Optimal Tree-based Group Key Management Schemes

In key management schemes that realize secure multicast communications encrypted by group keys on a public network, tree structures are often used to update the group keys efficiently. Selçuk and Sidhu have proposed an efficient scheme which updates dynamically the tree structures based on the withdrawal probabilities of members. In this paper, it is shown that Selçuk-Sidhu scheme is asymptotic...

متن کامل

Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems

Key management in multicast dynamic groups, where users can leave or join at their ease is one of the most crucial and essential part of secure communication. Various efficient management strategies have been proposed during last decade that aim to decrease encryption costs and transmission overheads. In this report, two different types of key management schemes are proposed. First proposed sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014