CFP last date
20 May 2024
Reseach Article

Article:Secure Decentralized Group Key Management through Progressive Approach

by S. Sandosh, V.Akila, S. Uthayashangar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 10
Year of Publication: 2010
Authors: S. Sandosh, V.Akila, S. Uthayashangar
10.5120/1423-1920

S. Sandosh, V.Akila, S. Uthayashangar . Article:Secure Decentralized Group Key Management through Progressive Approach. International Journal of Computer Applications. 9, 10 ( November 2010), 6-9. DOI=10.5120/1423-1920

@article{ 10.5120/1423-1920,
author = { S. Sandosh, V.Akila, S. Uthayashangar },
title = { Article:Secure Decentralized Group Key Management through Progressive Approach },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 10 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number10/1423-1920/ },
doi = { 10.5120/1423-1920 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:12.780212+05:30
%A S. Sandosh
%A V.Akila
%A S. Uthayashangar
%T Article:Secure Decentralized Group Key Management through Progressive Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 10
%P 6-9
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Multicast routing protocols are widely used as efficient communication methods for Group-oriented applications. Decentralized system is preferred to improve bandwidth economization. However, security with the key management for such protocols re-mains a significant problem. In this paper, a secure group key agreement over decentralized systems is proposed. The proposed system is based on the use of progressive approach which is a step by step improvement process. The main advantage of our proposed system is the periodic Authentication of group key members.

References
  1. Bibo Jiang and Xiulin Hu, Wuhan,“A Survey of Group Key Management,”CSSE 1282,VOL:12, IEEE Nov 2008 .
  2. Feng Zhu, Wei Zhu, Matt W. Mutka, “Private and Secure Service Discovery via Progressive and Probabilistic Exposure” VOL. 18, NO. 11, IEEE November 2008.
  3. C. Kenneth Miller, The Internet Protocol Journal - Volume 1, No. 2 “Reliable Multicast Protocols and Applications”, September 1998 StarBurst Communications.
  4. E. Michail, A.P. Kakarountas, A. Milidonis, “Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 Hash function”©2004 IEEE.
  5. Raul Monroy and Graham Steel, “Faulty Group Protocols Version 1.0”, February 2007.
  6. M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B.Smith, and L. Yu, “Negotiating Trust on the Web,” IEEE Internet Computing, pp. 30-37,IEEE Dec 2002.
  7. F. Zhu, M. Mutka, and L. Ni, “Service Discovery in Pervasive Computing Environments,” Pervasive Computing, vol. 4, pp. 81-90, IEEE Oct 2005.
  8. F. Zhu, M. Mutka, and L. Ni, “A Private, Secure and User-CentricInformation Exposure Model for Service Discovery Protocols,”. Mobile Computing, vol. 5, pp. 418-429, IEEE 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Secure Decentralized Key Management Multicast