Elements of information theory
Elements of information theory
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
A framework for delivering multicast message in networks with mobile hosts
Mobile Networks and Applications - Special issue: routing in mobile communications networks
Multicast security and its extension to a mobile environment
Wireless Networks
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Multicasting on the Internet and Its Applications
Multicasting on the Internet and Its Applications
Multicast in 3G networks:: employment of existing IP multicast protocols in UMTS
WOWMOM '02 Proceedings of the 5th ACM international workshop on Wireless mobile multimedia
Efficient Security for Large and Dynamic Multicast Groups
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Key distribution for secure multimedia multicasts via data embedding
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
New call blocking versus handoff blocking in cellular networks
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 1
RelM: reliable multicast for mobile networks
Computer Communications
Multicast group behavior in the Internet's multicast backbone (MBone)
IEEE Communications Magazine
User mobility modeling and characterization of mobility patterns
IEEE Journal on Selected Areas in Communications
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
Deployment issues for the IP multicast service and architecture
IEEE Network: The Magazine of Global Internetworking
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
International Journal of Ad Hoc and Ubiquitous Computing
Secure group communication in wireless mesh networks
Ad Hoc Networks
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Key-update distribution in secure group communication
Computer Communications
An efficient key management scheme for live streaming
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
Journal of Network and Computer Applications
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Efficient clustering for multicast key distribution in MANETs
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Key Management in Secure Satellite Multicast Using Key Hypergraphs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Secure multicast applications require key management that provides access control. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating. A communication-efficient class of key management schemes is those that employ a tree hierarchy. However, these tree-based key management schemes do not exploit issues related to the delivery of keying information that provide opportunities to further reduce the communication burden of rekeying. In this paper, we propose a method for designing multicast key management trees that match the network topology. The proposed key management scheme localizes the transmission of keying information and significantly reduces the communication burden of rekeying. Further, in mobile wireless applications, the issue of user handoff between base stations may cause user relocation on the key management tree. We address the problem of user handoff by proposing an efficient handoff scheme for our topology-matching key management trees. The proposed scheme also addresses the heterogeneity of the network. For multicast applications containing several thousands of users, simulations indicate a 55%-80% reduction in the communication cost compared to key trees that are independent of the network topology. Analysis and simulations also show that the communication cost of the proposed topology-matching key management tree scales better than topology-independent trees as the size of multicast group grows.