Scalable secure one-to-many group communication using dual encryption

被引:38
|
作者
Dondeti, LR
Mukherjee, S
Samal, A
机构
[1] Nortel Networks, Billerica, MA 01821 USA
[2] Panason Informat & Networking Technol Labs, Princeton, NJ 08540 USA
[3] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
关键词
secure group communication; key distribution; multicast security; hierarchical subgrouping;
D O I
10.1016/S0140-3664(00)00255-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multicasting is a scalable solution for group communication. Whereas secure unicast is a well-understood problem, scalable secure multicast poses several unique security problems, namely group membership control, scalable key distribution to a dynamic group. We address scalability in the proposed protocol by using hierarchical subgrouping. Third party hosts or members of the multicast group, designated as subgroup members, are responsible for secret key distribution and group membership management at the subgroup level. Unlike existing secure multicast protocols, our protocol, through dual encryption, can use "untrusted" subgroup managers (SGMs) to distribute data encryption keys securely. We analytically prove the correctness of the protocol in ensuring secure communication, describe possible collusion scenarios and our protocol's ability to overcome them. We compare our protocol with existing scalable key distribution schemes through simulation using real-life multicast traces and show that our protocol alleviates the encryption overhead at the sender by distributing some of the work among the SGMs. The proposed protocol performs better than the existing scalable protocols as the number of active members in a multicast group increases. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1681 / 1701
页数:21
相关论文
共 50 条
  • [1] SEMSOMM - A scalable multiple encryption scheme for one-to-many multicast
    Weiler, N
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 231 - 236
  • [2] Efficient many-to-one and one-to-many multiparty quantum secure direct communication with authentication
    Liu, Wenjie
    Chen, Hanwu
    Li, Zhiqiang
    Zhao, Jun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1282 - 1285
  • [3] A scalable multicast architecture for one-to-many telepresentations
    Gemmell, J
    Schooler, E
    Kermode, R
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS, 1998, : 128 - 139
  • [4] In-Kernel Relay for Scalable One-to-Many Streaming
    Lin, Ying-Dar
    Ku, Chia-Yu
    Lai, Yuan-Cheng
    Hung, Chia-Fon
    IEEE MULTIMEDIA, 2013, 20 (01) : 69 - 79
  • [5] A novel one-to-many and many-to-one asymmetric encryption model and its algorithms
    Shi, Run-hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3906 - 3913
  • [6] One-to-Many Simultaneous Secure Quantum Information Transmission
    Andronikos, Theodore
    Sirokofskich, Alla
    CRYPTOGRAPHY, 2023, 7 (04)
  • [7] Proposal for Secure Group Communication using Encryption Technology
    Tanada, Shinya
    Suzuki, Hidekazu
    Naito, Katsuhiro
    Watanabe, Akira
    2016 NINTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2016, : 68 - 73
  • [8] A dual encryption protocol for scalable secure multicasting
    Dondeti, LR
    Mukherjee, S
    Samal, A
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 2 - 8
  • [9] Design the Video Conferencing Robot for One-to-Many Communication using Smartphone
    Choi, Dong-Won
    Song, Tae-Houn
    Jeong, Soon-Mook
    Jeon, Jae Wook
    2011 11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS), 2011, : 671 - 675
  • [10] The one-to-many TCP overlay: A scalable and reliable multicast architecture
    Baccelli, F
    Chaintreau, A
    Liu, Z
    Riabov, A
    IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 1629 - 1640