Dynamic balanced key tree management for secure multicast communications

被引:44
|
作者
Ng, Wee Hock Desmond
Howarth, Michael
Sun, Zhili
Cruickshank, Haitham
机构
[1] AT&T Singapore, Singapore 118261, Singapore
[2] Univ Surrey, Ctr Commun Syst Res, Surrey GU2 7XH, England
基金
英国工程与自然科学研究理事会;
关键词
multicast security; group key management; secure group communication;
D O I
10.1109/TC.2007.1022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure multicast communication is important for applications such as pay-per-view and secure videoconferencing. A key tree approach has been proposed by other authors to distribute the multicast group key in such a way that the rekeying cost scales with the logarithm of the group size for a join or depart request. The efficiency of this key tree approach critically depends on whether the key tree remains balanced over time as members join or depart. In this paper, we present two Merging Algorithms suitable for batch join requests. To additionally handle batch depart requests, we extend these two algorithms to a Batch Balanced Algorithm. Simulation results show that our three algorithms not only maintain a balanced key tree, but their rekeying costs are lower compared with those of existing algorithms.
引用
收藏
页码:590 / 605
页数:16
相关论文
共 50 条
  • [1] Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks
    Hua-Yi Lin
    Tzu-Chiang Chiang
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [2] Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks
    Lin, Hua-Yi
    Chiang, Tzu-Chiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [3] Revised Variable Length Interval Batch Rekeying with Balanced Key Tree Management for Secure Multicast Communications
    Prathap, Joe P. M.
    Vasudevan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 232 - 241
  • [4] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42
  • [5] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (01) : 21 - 30
  • [6] Computation-and-storage-efficient key tree management protocol for secure multicast communications
    Je, Dong-Hyun
    Lee, Jun-Sik
    Park, Yongsuk
    Seo, Seung-Woo
    COMPUTER COMMUNICATIONS, 2010, 33 (02) : 136 - 148
  • [7] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 17 - 23
  • [8] A dynamic core-based tree scheme for key management in secure multicast
    Xu, ZQ
    Chen, L
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 805 - 812
  • [9] Decentralized group key management for secure multicast communications
    Peyravian, M
    Matyas, SM
    Zunic, N
    COMPUTER COMMUNICATIONS, 1999, 22 (13) : 1183 - 1187