New Key Tree Management Protocol for the Efficiency of Storage and Computation Time in Secure Multicast Communication

被引:0
|
作者
Je, Dong-Hyun [1 ]
Seo, Seung-Woo [1 ]
机构
[1] Seoul Natl Univ, Sch Elect Engn & Comp Sci, Seoul 151, South Korea
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A group key management is essential method guaranteeing of data confidentiality and integrity in secure multicast communication. For secure multicast, group key management schemes have focused on communication cost, i.e., the number of update messages, to efficiently use bandwidth. To reduce the communication cost, many group key management schemes adopt a key tree structure. But, to adopt a key tree structure, a more powerful capability is needed, as a tradeoff, to store various kinds of keys and to execute several cryptography algorithms storage cost and computation cost, respectively. But, it is important to simultaneously reduce not only the overhead of communication cost but also the overheads of storage and computation costs in mobile devices which have limited storage space and computation capability. In this paper, we propose a key tree structure, and a key tree management protocol for the efficiency of storage and computation costs. The proposed protocol adaptively controls the key tree structure not only to reduce the increase of the communication cost and but also to minimize the storage and the computation costs by using the limited resource information from each group members. We analyze the proposed protocol with three kinds of cost metrics and conduct simulations. The results show that the proposed protocol can save storage and computation costs. As a tradeoff, the proposed protocol requires a very small increment of communication cost if the ratio of leaving group members and the number of group members are moderately large in a batch rekeying interval.
引用
收藏
页码:653 / 657
页数:5
相关论文
共 50 条
  • [41] A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
    Jin, ByungWook
    Lee, Keun-Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 303 - 310
  • [42] A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    Pour, Alireza Nemancy
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    COMPUTER NETWORKS, 2007, 51 (17) : 4727 - 4743
  • [43] Secure and efficient wireless multicast communication using trust-based key management
    Yadava, Manisha
    Pandey, Ajay Shekhar
    Singh, Karan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03): : 711 - 727
  • [44] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764
  • [45] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Wu, Qi-wu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1859 - 1883
  • [46] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Victor R. L. Shen
    Wei-Chieh Huang
    Wireless Personal Communications, 2015, 85 : 1741 - 1764
  • [47] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Qi-wu Wu
    Wireless Personal Communications, 2013, 70 : 1859 - 1883
  • [48] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2015, 3 (01) : 21 - 30
  • [49] An Efficient Structure for LKH Key Tree on Secure Multicast Communications
    Sakamoto, Naoshi
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 17 - 23
  • [50] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148