CFP last date
20 May 2024
Reseach Article

Scalable rekeying limited to subgroup using Hybrid key trees

by V. Valli Kumari, D.V. Naga Raju, K.V.S.V.N Raju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 17
Year of Publication: 2010
Authors: V. Valli Kumari, D.V. Naga Raju, K.V.S.V.N Raju
10.5120/371-558

V. Valli Kumari, D.V. Naga Raju, K.V.S.V.N Raju . Scalable rekeying limited to subgroup using Hybrid key trees. International Journal of Computer Applications. 1, 17 ( February 2010), 1-7. DOI=10.5120/371-558

@article{ 10.5120/371-558,
author = { V. Valli Kumari, D.V. Naga Raju, K.V.S.V.N Raju },
title = { Scalable rekeying limited to subgroup using Hybrid key trees },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 17 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number17/371-558/ },
doi = { 10.5120/371-558 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:51.237657+05:30
%A V. Valli Kumari
%A D.V. Naga Raju
%A K.V.S.V.N Raju
%T Scalable rekeying limited to subgroup using Hybrid key trees
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 17
%P 1-7
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Maintaining security is a critical issue in any group communication protocols. The objective of security in a group communication is to ensure the access only to the legitimate members of the multicast group. The entry and eviction of the members are the main criteria to change the group key and to give them more assurance of a secret communication, which is known as re-keying. Since it is a frequently performed activity during a communication, the group key updating need to be done in a scalable and efficient manner. Earlier, client-server paradigm is the most predominantly used technique for applications like conferencing, chat groups, interactive video gaming, etc which use the concept of unicast for the transmission of data. Present day advancements in the Internet technologies, especially the increase of bandwidth are definitely encouraging environment for new developments. Unlike the old communication models, where the delivery of the packets are to be carried out in an unicast model, multicasting technique provides an efficient delivery service to larger user-community with effective and efficient network resource utilization.

References
  1. H. Harney and C. Muckenhim, Group Key Management Protocol (GKMP) Architecture," RCF 2094, July 1997.
  2. H. Harney and C. Muckenhim, Group Key Management Protocol (GKMP) Specification, RFC 2093, July 1997.
  3. G. H. Chiou and W. T. Chen. Secure Broadcast using Secure Lock. IEEE Transactions on Software Engineering, 15(8):929-934, August 1989.
  4. C. K. Wong, M. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, February 2000.
  5. D.A. McGrew and A.T. Sherman. Key Establishment in Large Dynamic Groups using One-way Function Trees.
  6. B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior,J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure group communications for wireless networks. MILCOM, June 2001.
  7. FDLKH: fully decentralized key management scheme on a logical key hierarchy. Springer Berlin / Heidelberg, Volume 3089/2004
  8. S. Rafaeli and D. Hutchison. Hydra: a decentralized group key management. 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.
  9. DLPKH: Distributed Logical Public Key Hierarchy Rakesh Bobba, Himamshu Khurana.
  10. O. Rodeh, K. Birman, and D. Dolev. Optimized group rekey for group communication systems. Network and Distributed System Security, February 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Multicast group re-keying group communication secure channel