Optimizing batch Rekeying interval for Secure Group Communication based on Queuing Model
نویسندگان
چکیده
Rapid growth of Internet spawns many group oriented multicast applications like Internet pay TV, news dissemination and stock quote system. The fortes of these applications are the support of dynamic, scalable group membership and group members are geographically divergent. As members of the group move in and out, an imperative cryptographic rekeying model should be applied to preserve the confidentiality of the group. A symmetric key called as session key is employed to defend the group communication data during transit. Forward and backward secrecy is attained by updating the session key for every change in group membership. Depends on the application immediate rekeying or batch rekeying can be used employed. The problem with the batch rekeying algorithm is to determine the pertinent batch size and the optimal time for rekeying process. The main aim is to propose a mathematical model based on queuing theory principles by considering the request for rekeying as Poisson process, rekeying service as an exponential distribution. The performance of the proposed model is analyzed using Java based simulator. By varying the arrival rate and rekeying service rate the optimal batch size can be attained. The optimal rekeying interval improves the performance of the group when the group membership grows dynamically. Reduces the long waiting time of the rekeying requests and find the best batch size for the rekeying. Proposed mathematical model analyses the various control parameters for batch rekeying and locates the best values for the batch size and interval time using the M/M/1/K model queues.
منابع مشابه
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks
We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and the best batch rekey interval und...
متن کاملGroup key management: algorithms, benchmarking, and reconfigurable architectures
PREFACE vii Preface IP multicast is an efficient solution for group communication over the Internet, as both the sender resources and the network bandwidth are relieved with the aid of this emerging technology. However, this superiority suffers, when the group communication must fulfill some security requirements. An essential issue relates to sharing the communication key. Particularly, this k...
متن کاملOn optimal batch rekeying for secure group communications in wireless networks
Advances in wireless communications and 5 mobile computing have led to the emergence of group 6 communications and applications over wireless. In many of 7 these group interactions, new members can join and current 8 members can leave at any time, and existing members 9 must communicate securely to achieve application-specific 10 missions or network-specific functionality. Since wireless 11 net...
متن کاملGroup Key Management with Efficient Batch Rekeying in Mobile Ad-Hoc Network
A mobile ad-hoc network is a self configure network with dynamic infrastructure. The mobile network is self formed and self healing network. In MANET mobile nodes are connected by means of Wi-Fi, satellite transmission, etc to form a mobile network. Multi-hop technique is used while sending messages from source to sink; it also reduces delay in packet transferring. The path keeps on changing du...
متن کاملPerformance Analysis of Batch Rekey Algorithm for Secure Group Communications
The efficiency of rekeying is a main factor that influences the performance of secure group communications. Periodic batch rekeying for users join/leave is an effective way to improve the efficiency of rekeying. In this paper, we introduce queue theory into the batch rekey algorithm, and construct a model of batch rekey algorithm based on the queue theory. We then analyze the performance influe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCS
دوره 10 شماره
صفحات -
تاریخ انتشار 2014