Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Multiple Operations for Secure Multicast Communication

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 86 - Number 7
Year of Publication: 2014
Manisha Manjul
Rajesh Mishra

Manisha Manjul and Rajesh Mishra. Article: Multiple Operations for Secure Multicast Communication. International Journal of Computer Applications 86(7):26-30, January 2014. Full text available. BibTeX

	author = {Manisha Manjul and Rajesh Mishra},
	title = {Article: Multiple Operations for Secure Multicast Communication},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {86},
	number = {7},
	pages = {26-30},
	month = {January},
	note = {Full text available}


Group key management is a critical task to make the secure multicast application. Group manager is responsible for changing and re-distributing (rekeying) the group key whenever it deems necessary. Many applications will require a security infrastructure that ensures multiple levels of access control for group members and also require very fast rekeying so that it is not disruptive to their performance. We use a multi-operation key management scheme that achieves hierarchical group access control. Particularly, we use an integrated key graph that maintains keying material for all members with different access privileges. It also incorporates new functionalities that are not present in conventional multicast key management, such as user relocation on the key graph. We use the ECC-GKM elliptic curve cryptosystem for the key exchange and we show the multiple operations such as joining, leaving and switching for multiple levels of access control.


  • Wenbo Sh and Peng Gong, "A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography", International Journal of Distributed Sensor Networks Volume 2013 (2013), PP 1- 7.
  • H. Debiao, C. Jianhua, and H. Jin, "An Id-Based Client Authentication With Key Agreement Protocol For Mobile Client-Server Environment On Ecc With Provable Security," Information Fusion, vol. 13, no. 3, pp. 223–230, 2012.
  • Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII Transactions On Internet And Information Systems, Vol. 6, No. 12, pp. 3352-3365, Dec 2012.
  • Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No. 6, pp. 689-705, 2010.
  • Yan , Sun "Hierarchical Group Access Control for Secure Multicast Communication " IEEE 2007
  • Y. Mao, Y. Sun, M. Wu, and K. J. R. Liu, "JET: Dynamic joint-exist-tree amortization and scheduling for contributory key agreement," IEEE/ACM Trans. Netw. , vol. 14, no. 5, pp. 1128–1140, Oct. 2006.
  • W. Trappe, Y. Wang, and K. J. R. Liu, "Resource-aware conference key establishment for heterogeneous networks," IEEE/ACM Trans. Netw. , vol. 13, no. 1, pp. 134–146, Feb. 2005.
  • Y. Sun and K. J. R. Liu, "Scalable Hierarchical Access Control in Secure Group Communications," in Proc. IEEE INFOCOM, Mar. 2004.
  • Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Netw. , vol. 12, no. 4, pp. 653–666, Aug. 2004.
  • B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communications," in Proc. IEEE Int. Conf. Commun. (ICC), 2002, vol. 2, pp. 1159–1163.
  • A. Perrig and J. D. Tygar, Secure Broadcast Communication: In Wired and Wireless Networks. Norwell, MA: Kluwer, 2002.
  • S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE J. Sel. Areas Commun. , vol. 20, no. 8, pp. 1511–1527, Oct. 2002.
  • Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: A performance analysis," in Proc. 2001 Conf. Applications, Technologies, Architectures, Protocols For Comput. Commun. , Aug. 2001, pp. 27–38.
  • A. Perrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in Proc. IEEE Symp. Security Privacy, 2001, pp. 247–262.
  • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE ICASSP'01, May 2001, p. 1449–1452.