Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Detection of Cheaters in Vector Space Secret Sharing Schemes
Designs, Codes and Cryptography
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A group key recovery mechanism based on logical key hierarchy
Journal of Computer Security
On Unconditionally Secure Distributed Oblivious Transfer
Journal of Cryptology
MPEG-4 AVC/H.264 and VC-1 Codecs Comparison Used in IPTV Video Streaming Technology
CERMA '08 Proceedings of the 2008 Electronics, Robotics and Automotive Mechanics Conference
End-to-End Quality of Service Monitoring in Convergent IPTV Platforms
NGMAST '09 Proceedings of the 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Proceedings of the Third international conference on Applied Cryptography and Network Security
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
IEEE Wireless Communications
Hi-index | 0.00 |
With the growing interest in converging fixed and mobile networks (FMC), mobile applications will require more and more resources from both the network and the mobile device. In such context, multicasting is essential because it lowers bandwidth consumption by simultaneously reaching a group of multiple recipients. Securing multicast flows has been extensively studied in the past, but none of the existing solutions were meant to handle the constraints imposed by mobile scenarios, in particular the high packet-loss rate. The need for a low overhead self-healing rekeying mechanism that is scalable, reliable and suitable for mobile environments has never been more urgent than with the arrival of FMC in 4G networks. This paper presents two self-healing recovery schemes based on the dual directional hash chains (DDHC) for the logical key hierarchy (LKH) rekeying protocol. This enables a member that has missed up to m consecutive key updates to recover the missing decryption keys without asking the group controller key server (GCKS) for retransmission. Conducted simulations show considerable improvements in the ratio of decrypted messages and in the rekey message overhead in high packet loss environments.