A key management scheme for secure group communication using binomial key trees

被引:9
|
作者
Aparna, R. [1 ]
Amberker, B. B. [2 ]
机构
[1] Siddaganga Inst Technol, Dept Comp Sci & Engn, Tumkur 572103, Karnataka, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Warangal, Andhra Pradesh, India
关键词
PROTOCOL;
D O I
10.1002/nem.742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous emerging applications, such as teleconferencing, board meetings, pay-per-view and scientific discussions, rely on a secure group communication model. Scalable group rekeying is an important issue in the secure group communication model as the nature of the group is dynamic. The number of encryptions performed and rekey messages constructed should be minimized to carry out updating of the group key, and secure delivery of the group key should be carried out in an efficient manner. In this paper, we propose a new scheme to manage the secure group using the binomial key tree approach. In this scheme, the number of encryptions performed and rekey messages constructed during membership change are fewer compared to the scheme proposed by Wong and others. Further, it is not required to balance the tree after each membership change. We show that, for a large group, the average encryption cost and rekey message cost are independent of the size of the group for join operation and logarithmic in size of the group for leave operation. Hence our scheme is scalable. Copyright c 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:383 / 418
页数:36
相关论文
共 50 条
  • [1] An efficient scheme to handle bursty behavior in secure group communication using binomial key trees
    Aparna, R.
    Amberker, B. B.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 1027 - 1043
  • [2] An efficient scalable key management scheme for secure group communication
    张骏
    谷大武
    马范援
    白英彩
    [J]. Journal of Harbin Institute of Technology(New series), 2006, (05) : 607 - 612
  • [3] Secure Group Communication Using Binomial Trees
    Aparna, R.
    Amberker, B. B.
    Pola, Divya
    Bathia, Pranjal
    [J]. 2009 IEEE 3RD INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS 2009), 2009, : 142 - +
  • [4] Key Management Scheme for Multi-Layer Secure Group Communication
    Aparna, R.
    Amberker, B. B.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 218 - +
  • [5] Secure SCADA communication by using a modified key management scheme
    Rezai, Abdalhossein
    Keshavarzi, Parviz
    Moravej, Zahra
    [J]. ISA TRANSACTIONS, 2013, 52 (04) : 517 - 524
  • [6] Secure key management in hierarchical group communication using agents
    Parvar, H.
    Moulavi, M. Amir
    [J]. 2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 217 - 221
  • [7] Key Management in Efficient and Secure Group Communication
    Yadav, Manisha
    Singh, Karan
    Pandey, Ajay Shekhar
    [J]. 2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 196 - 203
  • [8] A survey of key management for secure group communication
    Rafaeli, S
    Hutchison, D
    [J]. ACM COMPUTING SURVEYS, 2003, 35 (03) : 309 - 329
  • [9] Cryptanalysis of a polynomial-based key management scheme for secure group communication
    [J]. Kamal, A.A. (a_kamala@ece.concordia.ca), 1600, Femto Technique Co., Ltd. (15):
  • [10] A secure group key management scheme for sensor networks
    Poornima, A. S.
    Amberker, B. B.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 744 - +