Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
Framework for Authentication and Access Control of Client-Server Group Communication Systems
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
EHBT: An Efficient Protocol for Group Key Management
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Robustness to inflated subscription in multicast congestion control
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A Constant Size Rekeying Message Framework for Secure Multicasting
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Scalable and lightweight key distribution for secure group communications
International Journal of Network Management
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A scalable key management and clustering scheme for ad hoc networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Design of multicast protocols robust against inflated subscription
IEEE/ACM Transactions on Networking (TON)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Key management for secure multicast over IPv6 wireless networks
EURASIP Journal on Wireless Communications and Networking
Efficient group key management for multi-privileged groups
Computer Communications
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
An group key distribution protocol for secure group communications
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
A scalable key management and clustering scheme for wireless ad hoc and sensor networks
Future Generation Computer Systems
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Attribute-based on-demand multicast group setup with membership anonymity
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Attribute-based on-demand multicast group setup with membership anonymity
Computer Networks: The International Journal of Computer and Telecommunications Networking
Constructing general dynamic group key distribution schemes with decentralized user join
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Evaluation and analysis of computational complexity for secure multicast models
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Hierarchies of keys in secure multicast communications
Journal of Computer Security
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Secure unicast and multicast over satellite DVB using chaotic generators
International Journal of Internet Technology and Secured Transactions
Secure group key distribution protocol for distributed systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A hierarchical key management approach for secure multicast
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
A new group rekeying method in secure multicast
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Performance analysis of batch rekey algorithm for secure group communications
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A novel key management and distribution solution for secure video multicast
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An extension of secure group communication using key graph
Information Sciences: an International Journal
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
Hi-index | 0.08 |
Middleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context of multicasting or broadcasting is especially hard when privacy and authenticity is to be assured to highly dynamic groups where the application allows participants to join and leave at any time. Unicast security is well-known and has widely advanced into production state. But proposals for multicast security solutions that have been published so far are complex, often require trust in network components, or are inefficient. In this paper, we propose a framework of new approaches for achieving scalable security in IP multicasting. Our solutions assure that newly joining members are not able to understand past group traffic and that leaving members may not follow future communication. For versatility, our framework supports a range of closely related schemes for key management, ranging from tightly centralized to fully distributed, and even allows switching between these schemes on-the-fly with low overhead. Operations have low complexity [O(log N) for joins or leaves], thus granting scalability even for very large groups. We also present a novel concurrency-enabling scheme, which was devised for fully distributed key management. In this paper, we discuss the requirements for secure multicasting, present our flexible system, and evaluate its properties based on the existing prototype implementation