4,804 Hits in 3.3 sec

Dynamic Group Key Management Protocol [chapter]

Ghassan Chaddoud, Isabelle Chrisment, André Schaff
2001 Lecture Notes in Computer Science  
In this paper, after introducing the research work related to securing multicast communication, we present the protocol Baal 1 as a solution to the scalability problems of key management in dynamic multicast  ...  This protocol is based on distributed group key management by local controllers within sub-networks. 1 In the Canaanite's mythology, Baal is a generic semetic name meaning Master.  ...  Conclusion This paper has presented a new protocol for key management in dynamic multicast group, Baal.  ... 
doi:10.1007/3-540-45116-1_25 fatcat:tlf4reudxnedfgajvcozrzaxwy

Secure Multicast Key Distribution for Mobile Ad Hoc Networks [article]

D. SuganyaDevi, G.Padmavathi
2010 arXiv   pre-print
Thus this paper shows the specific challenges towards multicast key management protocols for securing multicast key distribution in mobile ad hoc networks, and present relevant multicast key management  ...  Key management is the fundamental challenge in designing secure multicast communications.  ...  KEY MANAGEMENT REQUIREMENTS Key management includes creating, distributing and updating the keys then it constitutes a basic block for secure multicast communication applications.  ... 
arXiv:1003.1799v1 fatcat:5gcy3vdnybhcfpuydjrfzcimra

Multimedia security in group communications: recent progress in key management, authentication, and watermarking

Ahmet M. Eskicioglu
2003 Multimedia Systems  
This makes multicast an ideal technology for communication among a large group of participants.  ...  Multicast security includes group membership control, secure key distribution, secure data transfer and copyright protection.  ...  A common approach in designing a scalable multicast service is to use a hierarchical structure in group key distribution.  ... 
doi:10.1007/s00530-003-0095-2 fatcat:fl5u6xiarzfxxezynq7t3slqri

Survey of Group Key Management Techniques in MANET

G. Narayana, M. Akkalakshmi, A. Damodaram
2016 International Journal of Future Generation Communication and Networking  
This is most suitable for MANETs. This protocol is a scalable and hybrid group key management protocol in MANET to divide the multicast group dynamically into clusters.  ...  Group key management (GKM) technique is employed for ensuring security and integrity in Mobile Ad hoc Networks (MANET ). It is the fundamental component of secure group communication systems.  ...  Hierarchical or Tree based Group Key Management Techniques Uday Pratap Singh et al [14] have proposed a distributed hierarchical group key management approach.  ... 
doi:10.14257/ijfgcn.2016.9.11.32 fatcat:bv5mijyi2bf63dy6foeqsyqsdm

Analysis of Group Key Management Scheme using One-way Function Tree

Kiran RKhandarkar, Rahul B. Mapari
2012 International Journal of Applied Information Systems  
These applications can be implemented by using secure multicast in which Group communication is secured by encrypting / decrypting data stream with a cryptographic key.  ...  In this paper, a novel scheme for multicast group key establishment has been developed by using one-way function tree of degree three.  ...  Because a host can receive transmitted data of any multicast groups, secure communications is more important in multicasting than in uni-casting Secure Multicast For securing multicast, data stream in  ... 
doi:10.5120/ijais12-450125 fatcat:4marlxpbebg7hojkb7xvfgaage

Security and Routing Scoped IP Multicast Addresses

Imed Romdhani, Ahmed Al-Dubai, Mounir Kellil
2009 2009 International Conference on Parallel Processing Workshops  
Our approach introduces a new multicast addressing scheme that embeds simultaneously a plurality of hierarchical scopes and associates each scope with a specific access control and routing method.  ...  IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet.  ...  Hierarchical multicast management approaches are required to fulfil multicast application specificity, topology engineering and routing, and security access control requirements.  ... 
doi:10.1109/icppw.2009.81 dblp:conf/icppw/RomdhaniAK09 fatcat:dxp3f6dz2rgszl74yxvb3jkbfi

Performance Analysis of Secure Group Key Mechanism in Mobile Ad Hoc Networks

Shanmuganthan C, Raviraj P
2018 International Journal of Engineering & Technology  
We are using cryptography techniques to provide secure communication in mobile ad hoc networks. To provide security using cryptography, key management is playing a vital role.  ...  In a group key management, when a member joins or leaves the group, it needs to generate a new key immediately to maintain authentication or secrecy.  ...  In a centralized group key management protocols, there is a group key server (KS) to manage the keys. In a distributed approach every member of a group is responsible for managing the keys.  ... 
doi:10.14419/ijet.v7i4.10.20932 fatcat:wiaw2tmvl5ebnbwqwvmtnhjwna

Key management approaches to offer data confidentiality for secure multicast

Kin-Ching Chan, S.-M.G. Chan
2003 IEEE Network  
A secure multicast system supported by key management generally offers the following security features.  ...  For instance, data confidentiality, one of the most important features in network security, can be offered in this environment by means of a pair of keys.  ...  approaches; and secure multicast framework approaches.  ... 
doi:10.1109/mnet.2003.1233915 fatcat:mjjovkgr5vbefhykkvfmlnfpbi

A secure group key management scheme for hierarchical mobile ad hoc networks

Dijiang Huang, Deep Medhi
2008 Ad hoc networks  
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks.  ...  Our approach aims to improve both scalability and survivability of group key management for large-scale wireless ad-hoc networks.  ...  Our approach considers 1) a security model, 2) a hierarchical group keying scheme using a key-chain approach, and 3) a roaming protocol between host groups and home groups.  ... 
doi:10.1016/j.adhoc.2007.04.006 fatcat:4icjgdexf5ez7i6i6cczdcqwzm

Engineering multicast group key distribution: a review

C. Vidakis, M. Fleury
2005 IEE Proceedings - Software  
For example, to maintain forward security [11] [12], whereby leaving members do not have access to any future group key 1 , an approach which scales linearly requires re-keying of a new group key to all  ...  Existing solutions for very-large scale group key distribution with a hierarchical virtual tree topology are engineered for commercial applications using a public key infrastructure and open source Java  ...  Some security weaknesses of Clique schemes (Section 5.2) have been reported. Kronos [18] is a novel approach to scalable group re-keying for secure multicast.  ... 
doi:10.1049/ip-sen:20045069 fatcat:jdcdgz7uu5hy5hi75erv2f7nl4

Why Hierarchical Key Distribution Is Appropriate for Multicast Networks [chapter]

Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
2000 Lecture Notes in Computer Science  
We use an analytical model of multicast group formation and network growth to look at the selection of a key distribution scheme from a network operation perspective.  ...  In most instances the choice of key server placement in a multicast network architecture is based on intuitive cryptographic considerations.  ...  The standard approach w ould be to use the hierarchical model as the key distribution agent a r c hitecture.  ... 
doi:10.1007/10719994_10 fatcat:e4vujcquancknnnb6y5hcoduke

Multicast Communication Using Different Group Key Managements

2019 International journal of recent technology and engineering  
For security enhancement in multicast communication Group Key Management (GKM) was introduced.  ...  Nowadays, multicast communication plays a major role in a large number of communication applications. In this multicast communication, the message privacy attains a highest position.  ...  ., Bose, S. and Kannan, A., 2014. Chinese remainder theorem based centralised group key management for secure multicast communication. IET information Security, 8(3), pp.179-187.  ... 
doi:10.35940/ijrte.b2707.078219 fatcat:lmmqflhfo5holfizubm3vlbd44

Scalable key management for secure multicast communication in the mobile environment

Jiannong Cao, Lin Liao, Guojun Wang
2006 Pervasive and Mobile Computing  
An important issue in secure group communication is key management, which is concerned with distributing and updating the keys for encrypting the multicast messages in a group of mobile users.  ...  In this paper, we propose a scalable and hierarchical key management (SHKM) protocol in the mobile Internet.  ...  Taking the two concerns into consideration, in this paper, we propose a new scalable and hierarchical key management (SHKM) protocol for secure multicast communication in mobile Internet.  ... 
doi:10.1016/j.pmcj.2005.11.003 fatcat:ojqbk43r5nabhgxzpigpcin2s4

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

2014 International Journal of Advanced Computer Science and Applications  
In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK) based on clustering management scheme for MANETs and different other  ...  Keywords-Group Key management; Mobile Ad hoc network; MANET security; Unicast/Multicast protocols in MANET. 208| P a g e  ...  In this paper, we have studied the different key management schemes for MANET and proposed a new scheme namely HSESGK, which is an efficient/scalable hierarchical key management scheme for MANET multicast  ... 
doi:10.14569/ijacsa.2014.050430 fatcat:lljwl356pjftvn3wrv65cnxcny

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet [chapter]

Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao
2005 Lecture Notes in Computer Science  
This paper describes a secure multicast infrastructure for large-scale group communications in Mobile Internet and proposes a key management protocol based on the infrastructure.  ...  The multicast communication domain is logically divided into several administrative areas with a key server associated with each area.  ...  Iolus [7] , a hierarchical framework for secure multicast is proposed with this philosophy in a scalable manner.  ... 
doi:10.1007/11534310_60 fatcat:dziozm3zrfh2jlxztwugrp4jdu
« Previous Showing results 1 — 15 out of 4,804 results