A New Groups Key Distribution for Secure Wireless Multicast

Article Preview

Abstract:

A session key distribution is proposed for secure multicast scheme, which employs decentralized group architecture and accommodates the dynamic group changing efficiently. Compared with the similar schemes, the proposed scheme has advantages with regard to the rekeying cost, the storage overhead and the computation efficiency. It achieves the backward/forward secrecy and has the capacity to provide data confidentiality and integrity.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 282-283)

Pages:

388-391

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Akyildiz IF, Wang X, Wang W. Wireless mesh networks: a survey. Computer Networks. 2005, 47(2005): 445-487.

DOI: 10.1016/j.comnet.2004.12.001

Google Scholar

[2] Rafaeli S, Hutchison D. A Survey of Key Management for Secure Group Communication, ACM Computing Surveys. 2003, 35(3): 309–329.

DOI: 10.1145/937503.937506

Google Scholar

[3] Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.

DOI: 10.1109/90.836475

Google Scholar

[4] Mittra S. Iolus: A Framework for Scalable Secure Multicasting, In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ACM SIGCOMM, 1997, p.277–288.

DOI: 10.1145/263105.263179

Google Scholar

[5] Diffie W, Hellman ME. New directions in cryptography. IEEE Transaction on Information Theory. 1976, 22: 644-654.

DOI: 10.1109/tit.1976.1055638

Google Scholar

[6] Huang C, Chiu Y, Chen K, Lei C. Secure multicast in dynamic environments. Computer Networks. 2007, 51(2007): 2805-2817.

DOI: 10.1016/j.comnet.2006.11.027

Google Scholar

[7] Chiu Y, Lei C, Huang C. Secure Multicast Using Proxy Encryption. Proceedings of International Conference on Information and Communications Security, ICICS 2005, Lecture Notes in Computer Science, vol. 3783, 2005, p.280–290.

DOI: 10.1007/11602897_24

Google Scholar

[8] Hur J, Shin Y, Yoon H. Decentralized group key management for dynamic networks using proxy cryptography. Proceedings the 3rd ACM international workshop on QoS and security for wireless and mobile networks, (2007).

DOI: 10.1145/1298239.1298261

Google Scholar