Communications of the ACM
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
A reliable multicast framework for light-weight sessions and application level framing
IEEE/ACM Transactions on Networking (TON)
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Introduction to process-oriented simulation and CSIM (tutorial session)
WSC' 90 Proceedings of the 22nd conference on Winter simulation
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Multicast transport protocols: a survey and taxonomy
IEEE Communications Magazine
Enclaves: enabling secure collaboration over the Internet
IEEE Journal on Selected Areas in Communications
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure PIM-SM multicast routing protocol
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Efficient clustering for multicast key distribution in MANETs
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.24 |
Multicasting is a scalable solution for group communication. Whereas secure unicast is a well-understood problem, scalable secure multicast poses several unique security problems, namely group membership control, scalable key distribution to a dynamic group. We address scalability in the proposed protocol by using hierarchical subgrouping. Third party hosts or members of the multicast group, designated as subgroup members, are responsible for secret key distribution and group membership management at the subgroup level. Unlike existing secure multicast protocols, our protocol, through dual encryption, can use ''untrusted'' subgroup managers (SGMs) to distribute data encryption keys securely. We analytically prove the correctness of the protocol in ensuring secure communication, describe possible collusion scenarios and our protocol's ability to overcome them. We compare our protocol with existing scalable key distribution schemes through simulation using real-life multicast traces and show that our protocol alleviates the encryption overhead at the sender by distributing some of the work among the SGMs. The proposed protocol performs better than the existing scalable protocols as the number of active members in a multicast group increases.