New Key Tree Management Protocol for the Efficiency of Storage and Computation Time in Secure Multicast Communication

被引:0
|
作者
Je, Dong-Hyun [1 ]
Seo, Seung-Woo [1 ]
机构
[1] Seoul Natl Univ, Sch Elect Engn & Comp Sci, Seoul 151, South Korea
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A group key management is essential method guaranteeing of data confidentiality and integrity in secure multicast communication. For secure multicast, group key management schemes have focused on communication cost, i.e., the number of update messages, to efficiently use bandwidth. To reduce the communication cost, many group key management schemes adopt a key tree structure. But, to adopt a key tree structure, a more powerful capability is needed, as a tradeoff, to store various kinds of keys and to execute several cryptography algorithms storage cost and computation cost, respectively. But, it is important to simultaneously reduce not only the overhead of communication cost but also the overheads of storage and computation costs in mobile devices which have limited storage space and computation capability. In this paper, we propose a key tree structure, and a key tree management protocol for the efficiency of storage and computation costs. The proposed protocol adaptively controls the key tree structure not only to reduce the increase of the communication cost and but also to minimize the storage and the computation costs by using the limited resource information from each group members. We analyze the proposed protocol with three kinds of cost metrics and conduct simulations. The results show that the proposed protocol can save storage and computation costs. As a tradeoff, the proposed protocol requires a very small increment of communication cost if the ratio of leaving group members and the number of group members are moderately large in a batch rekeying interval.
引用
收藏
页码:653 / 657
页数:5
相关论文
共 50 条
  • [31] A hierarchical key management approach for secure multicast
    Wang, J
    Mihaljevic, MJ
    Harn, L
    Imai, H
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2006, PROCEEDINGS, 2006, 3894 : 422 - 434
  • [32] Efficient algorithms for secure multicast key management
    Khabiri, Elham
    Bettayeb, Said
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 787 - +
  • [33] Efficient Key Management for Secure Wireless Multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1131 - 1136
  • [34] Dynamics of key management in secure satellite multicast
    Howarth, MP
    Iyengar, S
    Sun, ZL
    Cruickshank, H
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (02) : 308 - 319
  • [35] Approximation Algorithms for Key Management in Secure Multicast
    Chan, Agnes
    Rajaraman, Rajmohan
    Sun, Zhifeng
    Zhu, Feng
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 148 - +
  • [36] Proxy encryptions for secure multicast key management
    Mukherjee, R
    Atwood, JW
    LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 377 - 384
  • [37] Key management and distribution for secure multimedia multicast
    Trappe, W
    Song, J
    Poovendran, R
    Liu, KJR
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 544 - 557
  • [38] A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
    Jin, ByungWook
    Lee, Keun-Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 51 - 58
  • [39] Computation and communication efficient secure group key exchange protocol for low configuration system
    Rawat A.S.
    Deshmukh M.
    International Journal of Information Technology, 2021, 13 (3) : 839 - 843
  • [40] Chinese remainder Theorem based centralised group key management for secure multicast communication
    Vijayakumar, Pandi
    Bose, Sudan
    Kannan, Arputharaj
    IET INFORMATION SECURITY, 2014, 8 (03) : 179 - 187