Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Distributed registration and key distribution for online universities
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Dynamic Group Communication Security
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Reliable Group Rekeying: A Performance Analysis
Reliable Group Rekeying: A Performance Analysis
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Multicast group behavior in the Internet's multicast backbone (MBone)
IEEE Communications Magazine
Scalable secure one-to-many group communication using dual encryption
Computer Communications
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Distributed servers approach for large-scale secure multicast
IEEE Journal on Selected Areas in Communications
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Mykil: a secure and highly available key management system for large group multicast
International Journal of Computers and Applications
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Efficient clustering for multicast key distribution in MANETs
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
International Journal of Wireless Networks and Broadband Technologies
Hi-index | 0.00 |
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current users. The bandwidth used for such rekeying operation could be high when the group size is large. The proposed solutions to cope with this limitation, commonly called 1 affects n phenomenon, consist of organizing group members into subgroups that use independent traffic encryption keys. This kind of solutions introduce a new challenge which is the requirement of decrypting and reencrypting multicast messages whenever they pass from one subgroup to another. This is a serious drawback for applications that require real-time communication such as video-conferencing. In order to avoid the systematic decryption / reencryption of messages, we propose in this paper an adaptive solution which structures group members into clusters according to the application requirements in term of synchronization and the membership change behavior in the secure session. Simulation results show that our solution is efficient and typically adaptive compared to other schemes.