Parity-based loss recovery for reliable multicast transmission
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Effective erasure codes for reliable computer communication protocols
ACM SIGCOMM Computer Communication Review
A reliable multicast framework for light-weight sessions and application level framing
IEEE/ACM Transactions on Networking (TON)
A digital fountain approach to reliable distribution of bulk data
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Scoped hybrid automatic repeat reQuest with forward error correction (SHARQFEC)
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
An Experimental Study of Adaptive Forward Error Correction for Wireless Collaborative Computing
SAINT '01 Proceedings of the 2001 Symposium on Applications and the Internet (SAINT 2001)
A Comparison of Known Classes of Reliable Multicast Protocols
ICNP '96 Proceedings of the 1996 International Conference on Network Protocols (ICNP '96)
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A comparison of sender-initiated and receiver-initiated reliable multicast protocols
IEEE Journal on Selected Areas in Communications
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Efficient group key management for multi-privileged groups
Computer Communications
International Journal of Sensor Networks
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Reliable Key Distribution Scheme for Lossy Channels
IEICE - Transactions on Information and Systems
Secure group communication in wireless mesh networks
Ad Hoc Networks
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
An Efficient and Secure Self-Healing Scheme for LKH
Journal of Network and Systems Management
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
Key management for secure multicast using the ringnet hierarchy
CIS'04 Proceedings of the First international conference on Computational and Information Science
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
R&D/Technology: ZigBee: A long way to go?
Infosecurity
Collusion resistant self-healing key distribution in mobile wireless networks
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
We present the design and specification of a protocol for scalable and reliable group rekeying together with performance evaluation results. The protocol is based upon the use of key trees for secure groups and periodic batch rekeying. At the beginning of each rekey interval, the key server sends a rekey message to all users consisting of encrypted new keys (encryptions, in short) carried in a sequence of packets. We present a scheme for identifying keys, encryptions, and users, and a key assignment algorithm that ensures that the encryptions needed by a user are in the same packet. Our protocol provides reliable delivery of new keys to all users eventually. It also attempts to deliver new keys to all users with a high probability by the end of the rekey interval. For each rekey message, the protocol runs in two steps: a multicast step followed by a unicast step. Proactive forward error correction (FEC) multicast is used to reduce delivery latency. Our experiments show that a small FEC block size can be used to reduce encoding time at the server without increasing server bandwidth overhead. Early transition to unicast, after at most two multicast rounds, further reduces the worst-case delivery latency as well as user bandwidth requirement. The key server adaptively adjusts the proactivity factor based upon past feedback information; our experiments show that the number of NACKs after a multicast round can be effectively controlled around a target number. Throughout the protocol design, we strive to minimize processing and bandwidth requirements for both the key server and users.