Improved key management technique for secure multicasting over IP

被引:1
|
作者
Padmavathi G. [1 ,3 ]
Annadurai S. [2 ]
机构
[1] Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu
[2] Government College of Engineering, Tirunelveli, Tamil Nadu
[3] 12/10, 'Sruthi', Coimbatore, Tamil Nadu 641 025, Abbas Garden Extension
关键词
Group key; Key management; Multicasting; Rekeying and logical key hierarchy;
D O I
10.1007/s10922-005-6266-2
中图分类号
学科分类号
摘要
Multicast communication is going to be the communication paradigm of all future networks. Secure multicasting is a very vital problem in today's networks. In secure multicasting, the group members share a common key called the group key. Whenever the group members change, the group key must be changed. Therefore, many multicast security problems are abstracted into key management and distribution problems. The problem of distributing cryptographic keys to the group members in an optimum way that minimizes the communication and storage overheads are the important objectives of a secure multicast problem. In this paper, an efficient key management technique is proposed that minimizes the number of message exchanges and the number of keys stored. Existing key management methods have O(N) and O(log N) overheads. The proposed method shows further improvement. The model has been simulated and the results show improvements to existing approaches. © 2005 Springer Science+Business Media, Inc.
引用
收藏
页码:293 / 308
页数:15
相关论文
共 50 条
  • [31] Secure Transmission Over Remote Group: A New Key Management Prototype
    Sudha, K.
    Ranjith, J. Prem
    Ganapathy, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (01): : 102 - 105
  • [32] A Secure Data Transfer Approach With an Efficient Key Management Over Cloud
    Gupta, Lalit Mohan
    Garg, Hitendra
    Samad, Abdus
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2022, 17 (01)
  • [33] Toward integrating IP multicasting in internet network management protocols
    Al-Shaer, E
    Tang, Y
    COMPUTER COMMUNICATIONS, 2001, 24 (5-6) : 473 - 485
  • [34] IP multicasting technique and its application on multimedia network teaching system
    Li, SZ
    Li, TQ
    Chen, YD
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 61 - 64
  • [35] An Efficient Key Management Approach for Multicasting Supported Networks
    Kori, Narendra Kumar
    Raghuwanshi, Sandeep
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 905 - 908
  • [36] A public-key based secure mobile IP
    Zao, J
    Kent, S
    Gahm, J
    Troxel, G
    Condell, M
    Helinek, P
    Yuan, N
    Castineyra, I
    WIRELESS NETWORKS, 1999, 5 (05) : 373 - 390
  • [37] Secure Image Transcoding technique using chaotic key based algorithm with improved security
    Anoop, B. N.
    George, Sudhish N.
    Deepthi, P. P.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 693 - 697
  • [38] Key management for secure multicast over IPv6 wireless networks
    Aye, Win
    Siddiqi, Andmohammad Umar
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [39] Key Management for Secure Multicast over IPv6 Wireless Networks
    Win Aye
    Mohammad Umar Siddiqi
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [40] Group management strategies for secure multicasting on active virtual private networks
    Labonté, C
    Srinivas, S
    25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, : 213 - 222