Performance of Group Key Agreement Protocols over Multiple Operations

نویسندگان

  • Shanyu Zheng
  • Jim Alves-Foss
  • Stephen S. Lee
چکیده

A few group key protocols are analyzed, implemented and deployed, but the costs associated with them have been poorly understood. Their analysis of group key agreements performance is based on the cost of performing a single operation. In this paper we extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. We report our experimental results for 100 operations consist of combinations of join, leave, mass join, mass leave, merge, and partition. In order to thoroughly compare the performance of five protocols, we simulate three group operations: join-leave-mass joinmass leave, merge-partition, and join-leave-mass join-mass leave-merge-partition to observe what is not apparent from the theoretical analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and Performance of Group Key Agreement Protocols∗

Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic groups of participants. However, there is a lack of consistency in the literature in terms of operations supported and performance metrics of the various protocols. This makes it difficult for designers to choose the best protocol for their specific applications. To alleviate this ...

متن کامل

Exploring Average Performance of Group Key Management Algorithms over Multiple Operations∗

Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Key Agreement in Dynamic Peer Groups

ÐAs a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer teleand videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynam...

متن کامل

Anonymous ID-based Group Key Agreement Protocol without Pairing

Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group-oriented applications such as teleconferences, collaborative workspace, pay per-view etc. A number of group key agreement protocols have been proposed for these objectives. However most of the protocols have not considers the anonymity of the participants. Although in some a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005