Key Trees and the Security of Interval Multicast
نویسندگان
چکیده
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys in the key tree to securely multicast data to different subgroups within the group. The cost of securely multicasting data to a subgroup whose users are “consecutive” is O(log n) encryptions, where n is the total number of users in the group. The cost of securely multicasting data to an arbitrary subgroup is O(n/2) encryptions. However, this cost can be reduced to one encryption by introducing an additional key tree to the group.
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملMulticast computer network routing using genetic algorithm and ant colony
Due to the growth and development of computer networks, the importance of the routing topic has been increased. The importance of the use of multicast networks is not negligible nowadays. Many of multimedia programs need to use a communication link to send a packet from a sender to several receivers. To support such programs, there is a need to make an optimal multicast tree to indicate the opt...
متن کاملAn efficient key management scheme for secure wireless multicast
In the future, many multicast services will take place in the wireless domain. However, before these services can successfully be deployed, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we present a method for designing multicast key management trees that are suitable for mobile wireless environments. By matching the ...
متن کاملA Framework for Scalable Multicast Security with Bell-LaPedula Confidentiality Model
Multicast communications allow members of a group to efficiently exchange data. Normally, this exchange occurs between all group participants. However, there are applications that may require smaller subgroups to communicate without sharing information with all group members. Such a requirement can be captured within an information flow policy. We propose a framework for the creation and manage...
متن کاملHierarchical agent-based secure and reliable multicast in wireless mesh networks
We propose and analyze a hierarchical agent-based secure and reliable multicast (HASRM) algorithm for efficiently supporting secure and reliable mobile multicast in wireless mesh networks, with design considerations given to minimize the overall network cost incurred by reliable multicast packet delivery, mobility management, security key management, and group membership maintenance. HASRM dyna...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002