Advanced Search
Volume 26 Issue 1
Jan.  2004
Turn off MathJax
Article Contents
Zhu Wen-tao, Xiong Ji-ping, Li Jin-sheng, Hong Pci-lin. Hierarchical Key Management in Secure Multicast[J]. Journal of Electronics & Information Technology, 2004, 26(1): 7-13.
Citation: Zhu Wen-tao, Xiong Ji-ping, Li Jin-sheng, Hong Pci-lin. Hierarchical Key Management in Secure Multicast[J]. Journal of Electronics & Information Technology, 2004, 26(1): 7-13.

Hierarchical Key Management in Secure Multicast

  • Received Date: 2003-04-09
  • Rev Recd Date: 2003-09-12
  • Publish Date: 2004-01-19
  • Multicast is a preferred communication technique in multiple recipients and its importance is rapidly growing. The Internet Group Management: Protocol(IGMP) does not provide access control of the members. To provide communication confidentiality, traffic in secure multicast is encrypted with a session key known only by certified group members. Whenever there is a change in the group membership, the key has to be updated dynamically, thus key management is indicated as the sticking point in secure multicast rescarch. To be applicable to large scale multicast, hierarchical structure is introduced as a solution to the scalability problem of group key management. The paper addresses the logical key hierarchy and concentrates on the optimal structure problem of the key tree. A theoretical analysis is given in the paper with the result in correspondence with a previous experimental conclusion.
  • loading
  • Fenner W. Internet group management protocol, Version 2. IETF RFC2236, November 1997.[2]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol,Version 3. IETF RFC3376, October 2002.[3]Krusus P S, Macker J P. Techniques and issues in multicast security. Military Communications Conference, Boston, USA, 1998, Vol.3: 1028-1032.[4]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, http.∥www.securemulticast.org/smug-drafts.htm, August 2000.[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) architecture. IETF RFC2094, July 1997.[6]Mingyan Li, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint[J].IEEE Communications Letters.2002, 6(3):108-110[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. IEEE INFOCOM 2001, Anchorage, USA, 2001, Vol.1: 422-431.[8]Poovendran R, Baras J S. An information-theoretic approach for design and analysis of rootedtree-based multicast key management schemes[J].IEEE Trans. on Information Theory.2001, 47(7):2824-2834[9]Guang-Huei Chiou, Wen-Tsuen Chen. Secure broadcasting using the secure lock[J].IEEE Trans.on Software Engineering.1989, 15(8):929-934[10]Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng. On key distribution in secure multicasting. 25th Annual IEEE Conference on Local Computer Networks, Tampa, USA, 2000:208-212.[11]Trappe W, Jie Song, Poovendran R, Liu K J R. Key distribution for secure multimedia multicasts via data embedding. Acoustics, Speech, and Signal Processing, Salt Lake City, USA, 2001, Vol.3:1449-1452.[12]Chung Kei Wong, Gouda M, Lam S S. Secure group communications using key graphs[J].IEEE/ACM Trans. on Networking.2000, 8(1):16-30[13]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures. IETF RFC2627, June 1999.Moyer M, Rao J, Rohatgi P. Maintaining balanced key trees for secure multicast. Internet Draft,http.∥www.securemulticast.org/smug-drafts.htm, June 1999.[14]Xiaozhou Steve Li, Yang Richard Yang, Mohamed G. Gouda, Lam S S. Batch rekeying for secure group communications. 10th International Conference on World Wide Web, Hong Kong, May 2001: 525-534.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2188) PDF downloads(642) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return