Parity-based loss recovery for reliable multicast transmission
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Effective erasure codes for reliable computer communication protocols
ACM SIGCOMM Computer Communication Review
A digital fountain approach to reliable distribution of bulk data
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Scoped hybrid automatic repeat reQuest with forward error correction (SHARQFEC)
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
A Comparison of Known Classes of Reliable Multicast Protocols
ICNP '96 Proceedings of the 1996 International Conference on Network Protocols (ICNP '96)
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Secure Group Key Management Communication Lower Bound
A Secure Group Key Management Communication Lower Bound
Reliable Group Rekeying: A Performance Analysis
Reliable Group Rekeying: A Performance Analysis
A comparison of sender-initiated and receiver-initiated reliable multicast protocols
IEEE Journal on Selected Areas in Communications
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Performance Optimizations for Group Key Management Schemes
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
Gossip-based scalable and reliable group key distribution framework
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Key management for high bandwidth secure multicast
Journal of Computer Security
Addressing the shortcomings of one-way chains
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
An overlay approach to data security in ad-hoc networks
Ad Hoc Networks
Efficient group key management for multi-privileged groups
Computer Communications
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Secure group communication in wireless mesh networks
Ad Hoc Networks
A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key-update distribution in secure group communication
Computer Communications
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Hierarchies of keys in secure multicast communications
Journal of Computer Security
Optimal tree structure for key management of simultaneous join/leave in secure multicast
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
EventGuard: A System Architecture for Securing Publish-Subscribe Networks
ACM Transactions on Computer Systems (TOCS)
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Efficient security mechanisms for overlay multicast-based content distribution
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Distributing key updates in secure dynamic groups
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Privacy enhanced data outsourcing in the cloud
Journal of Network and Computer Applications
Hi-index | 0.00 |
In secure group communications, users of a group share a common group key. A key server sends the group key to authorized new users as well as performs group rekeying for group users whenever the key changes. In this paper, we investigate scalability issues of reliable group rekeying, and provide a performance analysis of our group key management system (called keygem) based upon the use of key trees. Instead of rekeying after each join or leave, we use periodic batch rekeying to improve scalability and alleviate out-of-sync problems among rekey messages as well as between rekey and data messages. Our analyses show that batch rekeying can achieve large performance gains. We then investigate reliable multicast of rekey messages using proactive FEC. We observe that rekey transport has an eventual reliability and a soft real-time requirement, and that the rekey workload has a sparseness property, that is, each group user only needs to receive a small fraction of the packets that carry a rekey message sent by the key server. We also investigate tradeoffs between server and receiver bandwidth requirements versus group rekey interval, and show how to determine the maximum number of group users a key server can support.