Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
MobiCom poster: secure spaces: location-based secure wireless group communication
ACM SIGMOBILE Mobile Computing and Communications Review
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
Last hop topology sensitive multicasting key managment
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
A scalable key management and clustering scheme for ad hoc networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
Efficient group key management for multi-privileged groups
Computer Communications
An group key distribution protocol for secure group communications
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
A scalable key management and clustering scheme for wireless ad hoc and sensor networks
Future Generation Computer Systems
Review: Comparative study of broadcast and multicast in 3GPP and 3GPP2 networks
Computer Communications
Application layer multicast tree for real-time media delivery
Computer Communications
Explicit routing in multicast overlay networks
Computer Communications
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
WSEAS Transactions on Computers
Secure group key distribution protocol for distributed systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
A novel key management and distribution solution for secure video multicast
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Secure group instant messaging using cryptographic primitives
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
An effective overlay h.263+ video multicast system over the internet
MIS'05 Proceedings of the 11th international conference on Advances in Multimedia Information Systems
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Hi-index | 0.07 |
We introduce and analyze a scalable rekeying scheme for implementing secure group communications Internet protocol multicast. We show that our scheme incurs constant processing, message, and storage overhead for a rekey operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are not known a priori. Our rekeying algorithm requires a particular clustering of the members of the secure multicast group. We describe a protocol to achieve such clustering and show that it is feasible to efficiently cluster members over realistic Internet-like topologies. We evaluate the overhead of our own rekeying scheme and also of previously published schemes via simulation over an Internet topology map containing over 280 000 routers. Through analysis and detailed simulations, we show that this rekeying scheme performs better than previous schemes for a single change to group membership. Further, for bulk group changes, our algorithm outperforms all previously known schemes by several orders of magnitude in terms of actual bandwidth usage, processing costs, and storage requirements.