Analysis of the various key management algorithms and new proposal in the secure multicast communications
نویسندگان
چکیده
With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life. Several key tree based approach has been proposed by various authors to create and distribute the multicast group key in effective manner. There are different key management algorithms that facilitate efficient distribution and rekeying of the group key. These protocols normally add communication overhead as well as computation overhead at the group key controller and at the group members. This paper explores the various algorithms along with the performances and derives an improved method. KeywordsGroup key management, Key tree, Multicast security, Rekeying
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملComputation-and-storage-efficient key tree management protocol for secure multicast communications
In secure multicast communication, group key management plays an essential role for the guarantee of data confidentiality and integrity. Because communication bandwidth is a limited resource, most group key management schemes for scalable secure multicast communications have focused on reducing the number of update messages, i.e., communication cost. To alleviate the scalability problem, a key ...
متن کاملHierarchical agent-based secure and reliable multicast in wireless mesh networks
We propose and analyze a hierarchical agent-based secure and reliable multicast (HASRM) algorithm for efficiently supporting secure and reliable mobile multicast in wireless mesh networks, with design considerations given to minimize the overall network cost incurred by reliable multicast packet delivery, mobility management, security key management, and group membership maintenance. HASRM dyna...
متن کاملPower proximity based key management for secure multicast in ad hoc networks
As group-oriented services become the focal point of ad hoc network applications, securing the group communications becomes a default requirement. In this paper, we address the problem of group access in secure multicast communications for wireless ad hoc networks. We argue that energy expenditure is a scarce resource for the energy-limited ad hoc network devices and introduce a crosslayer appr...
متن کاملNovel Multicast Key Management Scheme for PMIPv6-Based LTE Networks
Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an atte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0906.3956 شماره
صفحات -
تاریخ انتشار 2009