Key Management Scheme for Secure Multicast with Diverse Subscription Mobile Users

نویسنده

  • D. Saravanan
چکیده

---This paper is about the Group Key(GK) which is shared only by a group of mobile devices. This paper explains a new Group Key Management framework for the environment with dynamic mobile subscribers. Group key management plays very efficient and necessary role in mobile communication for enabling access control.The big thing is how to minimize the communication cost for generating rekeying among group members Previously,the concept is based on the assumptions where the group members have the same leaving probabilities and also that the tree is balanced and complete, but these assumptions are impractical.It’s might applicable for only a specific number of users. In my approach, first compute the exact communication cost for the general key-tee so no need for any assumptions. On the basis of the accurate communication cost,the paper express two algorithms for this purposeone for fundamental construction of a basic key-tree and another for upgrading the key-tree after membership changes. The first algorithm provides the framework to make an optimal key-tree that reflects the characteristics of users’ leaving probabilities, and the second algorithm provides regular maintenance of communication with less overhead in group rekeying Key terms : Encryption, Decryption, Key communication, Group management, Communication, Mobile devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Group Key Management Scheme for Wireless Cellular Systems

In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in wireless networks. Moving users onto the key tree causes extra key management resources even though they are still in s...

متن کامل

A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management...

متن کامل

Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...

متن کامل

Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks

Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an atte...

متن کامل

Performance Characteristics of Cluster -Based Multicast Key Distribution Scheme for Mobile Adhoc Networks

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015