New Key Tree Management Protocol for the Efficiency of Storage and Computation Time in Secure Multicast Communication

被引:0
|
作者
Je, Dong-Hyun [1 ]
Seo, Seung-Woo [1 ]
机构
[1] Seoul Natl Univ, Sch Elect Engn & Comp Sci, Seoul 151, South Korea
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A group key management is essential method guaranteeing of data confidentiality and integrity in secure multicast communication. For secure multicast, group key management schemes have focused on communication cost, i.e., the number of update messages, to efficiently use bandwidth. To reduce the communication cost, many group key management schemes adopt a key tree structure. But, to adopt a key tree structure, a more powerful capability is needed, as a tradeoff, to store various kinds of keys and to execute several cryptography algorithms storage cost and computation cost, respectively. But, it is important to simultaneously reduce not only the overhead of communication cost but also the overheads of storage and computation costs in mobile devices which have limited storage space and computation capability. In this paper, we propose a key tree structure, and a key tree management protocol for the efficiency of storage and computation costs. The proposed protocol adaptively controls the key tree structure not only to reduce the increase of the communication cost and but also to minimize the storage and the computation costs by using the limited resource information from each group members. We analyze the proposed protocol with three kinds of cost metrics and conduct simulations. The results show that the proposed protocol can save storage and computation costs. As a tradeoff, the proposed protocol requires a very small increment of communication cost if the ratio of leaving group members and the number of group members are moderately large in a batch rekeying interval.
引用
收藏
页码:653 / 657
页数:5
相关论文
共 50 条
  • [21] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42
  • [22] Decision Tree Based Key Management for Secure Group Communication
    Parthasarathi, P.
    Shankar, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (02): : 561 - 575
  • [23] Decision Tree Based Key Management for Secure Group Communication
    Parthasarathi, P.
    Shankar, S.
    Computer Systems Science and Engineering, 2021, 42 (02): : 561 - 575
  • [24] An enhanced hybrid key management protocol for secure multicast in ad hoc networks
    Bouassida, MS
    Chrisment, I
    Festor, O
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 725 - 742
  • [25] New Group Key Computation Technique for Secure Group Communication
    Aparna, R.
    Amberker, B. B.
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 1000 - 1004
  • [26] A lightweight key management protocol for secure communication in smart grids
    Moghadam, Mostafa Farhadi
    Nikooghadam, Morteza
    Mohajerzadeh, Amir Hossein
    Movali, Behzad
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 178
  • [27] Minimum redundancy tree for key distribution in secure multicast
    Chan, SP
    Kok, CW
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 171 - 171
  • [28] KEY AGREEMENT PROTOCOL FOR DISTRIBUTED SECURE MULTICAST FOR eASSESSMENT
    Durcheva, Mariana
    Ivanova, Malinka
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (01): : 47 - 58
  • [29] Secure decentralized multicast key management scheme
    Yang, Ming
    Xiao, Yang
    Lu, Shan-Shan
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (01): : 20 - 24
  • [30] Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism
    Liu, Guangwei
    Xu, Jian
    Cao, Mengmeng
    Zhou, Fucai
    Zhang, Bin
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 560 - +