Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay
ICDCSW '05 Proceedings of the Fourth International Workshop on Assurance in Distributed Systems and Networks (ADSN) (ICDCSW'05) - Volume 01
A survey of proposals for an alternative group communication service
IEEE Network: The Magazine of Global Internetworking
Key management approaches to offer data confidentiality for secure multicast
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM (Key Tree in Overlay Multicast). We described the operations of KTOM and compare the performance with other schemes, namely, host-to-host encryption, whole group encryption and SOT scheme.