A scalable multicast security protocol in hierarchy structures

  • Authors:
  • Chin-Chen Chang;Jung-San Lee;Ya-Fen Chang;Yi-Pei Hsieh

  • Affiliations:
  • Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan, R.O.C. and Department of Computer Science and Information Engineering, National Chung Cheng Univ ...;Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, R.O.C.;Department of Logistics Engineering and Management, National Taichung Institute of Technology, Taichung, Taiwan, R.O.C.;Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, R.O.C.

  • Venue:
  • ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The fundamental function of the network security protocols is to allow the authorized participant to communicate with others securely over the insecure network. Point-to-point packet transmission is the most common way of the communication over the network. However, it is not appropriate for many emerging applications such as message services, pay-TV, teleconference, or collaborate tasks. It is due to that these applications are structured on the group communication. Consequently, point-to-group or group-to-group packet transmission has become an important issue of the network in recent periods. In 2004, Aslan proposed a scalable multicast security protocol using a subgroup-key hierarchy. Aslan's protocol allows the user to communicate with others efficiently. Nevertheless, we find that each communicating user in the system has to maintain many secret keys such that it is not convenient for all users. Besides, while a member joins or leaves the communicating group, lots of involved participants have to change their secret keys to confirm the forward secrecy and the backward secrecy. In this article, we propose an improved multicast security protocol which not only preserves the functionality of Aslan's protocol but also possesses the performance better than other related works.