Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast in 3G networks:: employment of existing IP multicast protocols in UMTS
WOWMOM '02 Proceedings of the 5th ACM international workshop on Wireless mobile multimedia
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper we study multicast key management. We illustrate the important role that the features of the last hop play in the context of multicast key management. We then propose several schemes to distribute the keys while focusing on the topology of the last hop. We also show the importance of these schemes when considering last hop wireless networks such as 3G networks. Towards this we have also considered the current proposal for multicasting in 3G networks and shown the advantages that would ensue by considering the proposed last hop sensitive key management schemes in such bandwidth constrained networks.