Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
ACM Transactions on Information and System Security (TISSEC)
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Long-Lived Broadcast Encryption
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Performance Optimizations for Group Key Management Schemes
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable and lightweight key distribution for secure group communications
International Journal of Network Management
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
Gossip-based scalable and reliable group key distribution framework
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Key management for high bandwidth secure multicast
Journal of Computer Security
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mykil: a secure and highly available key management system for large group multicast
International Journal of Computers and Applications
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Hierarchies of keys in secure multicast communications
Journal of Computer Security
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
Key management for secure multicast using the ringnet hierarchy
CIS'04 Proceedings of the First international conference on Computational and Information Science
A hierarchical key management approach for secure multicast
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Efficient security mechanisms for overlay multicast-based content distribution
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Mobile Networks and Applications
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency of re-keying becomes the primary bottleneck for scalable group re-keying. In contrast, Kronos can scale to handle large and dynamic groups because the frequency of re-keying is independent of the size and membership dynamics of the group. Next, we describe how Kronos can be used in conjunction with distributed key management frameworks such as IGKMP, that use a single group-wide session key for encrypting communications between members of the group. Using a detailed simulation, we compare the performance tradeoffs between Kronos and other key management protocols.