Unreliable failure detectors for reliable distributed systems
Journal of the ACM (JACM)
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Queueing networks and Markov chains: modeling and performance evaluation with computer science applications
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Hydra: A Decentralised Group Key Management
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Reliable Group Rekeying: A Performance Analysis
Reliable Group Rekeying: A Performance Analysis
Proxy Encryptions for Secure Multicast Key Management
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
Multicast group behavior in the Internet's multicast backbone (MBone)
IEEE Communications Magazine
Scalable secure one-to-many group communication using dual encryption
Computer Communications
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Distributed servers approach for large-scale secure multicast
IEEE Journal on Selected Areas in Communications
Deployment issues for the IP multicast service and architecture
IEEE Network: The Magazine of Global Internetworking
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
Group key management has received a particular attention, these last years, in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, video-conferencing, collaborative work, and so forth. The dynamic aspect of group applications due to free membership joins and leaves in addition to members' mobility, makes security further challenging in the context of group communications. In this paper, we propose a novel key management approach based on adaptive clustering of encryption areas in order to tackle both scalability and dynamism issues in secure group communications. We demonstrate the pertinence of our solution through a proof of optimality with respect to the stated optimisation problem, and simulation results that illustrate when and how our solution outperforms other approaches proposed in the literature.