Improved key management technique for secure multicasting over IP

被引:1
|
作者
Padmavathi G. [1 ,3 ]
Annadurai S. [2 ]
机构
[1] Department of Computer Science, Avinashilingam Deemed University, Coimbatore, Tamil Nadu
[2] Government College of Engineering, Tirunelveli, Tamil Nadu
[3] 12/10, 'Sruthi', Coimbatore, Tamil Nadu 641 025, Abbas Garden Extension
关键词
Group key; Key management; Multicasting; Rekeying and logical key hierarchy;
D O I
10.1007/s10922-005-6266-2
中图分类号
学科分类号
摘要
Multicast communication is going to be the communication paradigm of all future networks. Secure multicasting is a very vital problem in today's networks. In secure multicasting, the group members share a common key called the group key. Whenever the group members change, the group key must be changed. Therefore, many multicast security problems are abstracted into key management and distribution problems. The problem of distributing cryptographic keys to the group members in an optimum way that minimizes the communication and storage overheads are the important objectives of a secure multicast problem. In this paper, an efficient key management technique is proposed that minimizes the number of message exchanges and the number of keys stored. Existing key management methods have O(N) and O(log N) overheads. The proposed method shows further improvement. The model has been simulated and the results show improvements to existing approaches. © 2005 Springer Science+Business Media, Inc.
引用
收藏
页码:293 / 308
页数:15
相关论文
共 50 条
  • [41] An Improved Cluster based Multicasting Technique on Vehicular Adhoc Network
    Swetha, P. K.
    Maheswari, Uma B.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 263 - 267
  • [42] A Hybrid Extension for IP Multicasting in Push-to-talk over Cellular Systems
    Gebarowski, Tomasz
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2012, 58 (01) : 77 - 83
  • [43] Group Key Establishment for Secure Multicasting in IoT-enabled Wireless Sensor Networks
    Porambage, Pawani
    Braeken, An
    Schmitt, Corinna
    Gurtov, Andrei
    Ylianttila, Mika
    Stiller, Burkhard
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 482 - 485
  • [44] Design of optimum key tree with minimized overheads for secure multicasting using Genetic algorithm
    Samukutty, Annadurai
    Ganapathi, Padmavathi
    IETE JOURNAL OF RESEARCH, 2006, 52 (04) : 275 - 280
  • [45] Secure Geocast in ad hoc network using Multicasting Key Distribution Scheme (SGAMKDS)
    Palanisamy, V.
    Annadurai, P.
    IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 190 - +
  • [46] Practical and provably-secure multicasting over high-delay networks
    Nam, JY
    Kim, H
    Kim, S
    Won, D
    Yang, HK
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 2, 2005, 3515 : 493 - 501
  • [47] Secure Verification Technique for Defending IP Spoofing Attacks
    Rengarajan, Alwar
    Sugumar, Rajendran
    Jayakumar, Chinnappan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (02) : 302 - 309
  • [48] Scalable secure group communication over IP multcast
    Banerjee, S
    Bhattacharjee, B
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2002, 20 (08) : 1511 - 1527
  • [49] Scalable secure group communication over IP multicast
    Banerjee, S
    Bhattacharjee, B
    NETWORK PROTOCOLS, 2001, : 261 - 269
  • [50] Calea compliant secure voice over IP system
    Thanthry, Nagaraja
    Goodrich, Christopher
    Pendse, Ravi
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 191 - +