Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Scalable Secure Group Communication over IP Multicast
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Scalable Cryptographic Key Management in Wireless Sensor Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Key management for long-lived sensor networks in hostile environments
Computer Communications
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
An efficient re-keying scheme for cluster based wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Storage-Optimal key sharing with authentication in sensor networks
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
A new authenticated group key transfer protocol for actual network environment
International Journal of Ad Hoc and Ubiquitous Computing
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Given the growing number of group applications in many existing and evolving domains recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups that undergo frequent fluctuations in group membership, the need for efficient encryption key management becomes critical. This paper presents a new key management framework based on a combinatorial formulation of the group multicast key management problem that is applicable to the general problem of managing keys for any type of trusted group communication, regardless of the underlying transmission method between group participants. Specifically, we describe Exclusion Basis Systems and show exactly when they exist. In addition, the framework separates key management from encrypted message transmission, resulting in a more efficient implementation of key management.