Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Multicast communication: protocols and applications
Multicast communication: protocols and applications
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Communication-efficient group key agreement
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Multicasting on the Internet and Its Applications
Multicasting on the Internet and Its Applications
Hydra: A Decentralised Group Key Management
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Computer Networks: The International Journal of Computer and Telecommunications Networking
Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution
Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
An extension of secure group communication using key graph
Information Sciences: an International Journal
Decentralized group key management for secure multicast communications
Computer Communications
Key management approaches to offer data confidentiality for secure multicast
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The Internet multicast capabilities have been used in enormous number of groups through the Internet. However, IP multicast does not deploy any mechanisms to secure the multicast messages in these groups. A lot of research efforts have been done to secure multicast messages. The idea behind the multicast security is to share a symmetric key between group members to encrypt/decrypt the multicast messages and to change this key after any membership change. The main re-keying problem is how to exchange the new group key between the group members in a scalable and secure way. In this paper we present a new multicast re-keying approach that is based on dividing the whole group into smaller subgroups. Each subgroup in turn is organized in a logical key hierarchy tree, and each subgroup member has the inverse key values of the other members in his subgroup in order to make the subgroup re-keying in a scalable and secure way. This decomposition, the proposed approach, which is named as Key Inverse Re-keying KIR, reduces the multicast complexity from O(n) to O(log 2m) where n is the total number of the whole group members and m is the number of members in each subgroup. The performance of KIR is compared with that of other group re-keying approaches to prove its effectiveness. The comparison is undertaken according to the computational overhead, communication overhead, storage overhead, and message size. The results show that KIR enhances the group performance in terms of computational overhead and communication overhead especially at the leave operation which represents a big problem for most of the previous group re-keying protocols.