Recommendations in Using Group Key Management Algorithms

نویسندگان

  • Weifeng Chen
  • Lakshminath R. Dondeti
چکیده

Scalable group key management (also known as group rekeying) schemes proposed in the literature can be classified into three categories: stateful schemes, stateless schemes and self-healing schemes. These schemes differ mainly on the interdependency of rekey messages and rekeying overhead. Logical key hierarchy (LKH) based approaches are stateful in that members should have received past rekeying messages to decrypt current rekeying messages. Stateless rekeying algorithms, such as subset difference based member revocation (SDR) mechanism, on the other hand, use keys sent during member registration/initialization to encrypt the group key. In other words rekeying messages are independent of each other and consequently members going offline can decrypt the group key without having to consult the group manager. Furthermore, SDR rekeying cost is dependent on the membership during an entire session whereas LKH rekeying cost is dependent on membership of the group during a rekeying instance. In this paper, we study the advantages and applicability of stateful and stateless rekeying algorithms to different applications. We analytically compare the storage cost and the rekeying cost (number of unitsize encrypted messages) of LKH and SDR in immediate and batch rekeying scenarios. We implemented the two algorithms and simulated different membership scenarios to compare the rekeying cost. The simulation study shows that LKH performs better in immediate rekeying and small batch rekeying, whereas stateless rekeying performs better as we process membership changes in larger batches. In some cases, stateless rekeying was observed to be as inefficient as encrypting the group key separately for each member of the group. We also report on the effect of member adjacency on rekeying cost. Based on our analysis, we make recommendations in using group key management algorithms for various application sceranios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing the Accuracy of Recommender Systems Using the Combination of K-Means and Differential Evolution Algorithms

Recommender systems are the systems that try to make recommendations to each user based on performance, personal tastes, user behaviors, and the context that match their personal preferences and help them in the decision-making process. One of the most important subjects regarding these systems is to increase the system accuracy which means how much the recommendations are close to the user int...

متن کامل

Evaluation erosivity factor of rain using Geostatistical algorithms (case study: Ilam province, Iran)

Today, soil erosion is considered as one of main subjects of watershed management at national and global levels. Assessment of decreasing risk of soil and it spatial distribution are one of key factors for successful evaluation of soil erosion. The objectives of research were calculation and modeling of rain erosivity factor in Ilam province using data of number of 28 pluviometry stations durin...

متن کامل

Two Strategies Based on Meta-Heuristic Algorithms for Parallel Row Ordering Problem (PROP)

Proper arrangement of facility layout is a key issue in management that influences efficiency and the profitability of the manufacturing systems. Parallel Row Ordering Problem (PROP) is a special case of facility layout problem and consists of looking for the best location of n facilities while similar facilities (facilities which has some characteristics in common) should be arranged in a row ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Solving Bi-objective Model of Hotel Revenue Management Considering Customer Choice Behavior Using Meta-heuristic Algorithms

The problem of maximizing the benefit from a specified number of a particular product with respect to the behavior of customer choices is regarded as revenue management. This managerial technique was first adopted by the airline industries before being widely used by many others such as hotel industries. The scope of this research is mainly focused on hotel revenue management, regarding which a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003