CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Key Management Techniques for Wired/Wireless Networks

Published on August 2011 by S. Jabeen Begum, Dr. T. Purusothaman
International Conference on Advanced Computer Technology
Foundation of Computer Science USA
ICACT - Number 1
August 2011
Authors: S. Jabeen Begum, Dr. T. Purusothaman
314c97c1-13b7-47a6-aebf-17cb748c7c1d

S. Jabeen Begum, Dr. T. Purusothaman . A Survey on Key Management Techniques for Wired/Wireless Networks. International Conference on Advanced Computer Technology. ICACT, 1 (August 2011), 21-24.

@article{
author = { S. Jabeen Begum, Dr. T. Purusothaman },
title = { A Survey on Key Management Techniques for Wired/Wireless Networks },
journal = { International Conference on Advanced Computer Technology },
issue_date = { August 2011 },
volume = { ICACT },
number = { 1 },
month = { August },
year = { 2011 },
issn = 0975-8887,
pages = { 21-24 },
numpages = 4,
url = { /proceedings/icact/number1/3227-icact067/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advanced Computer Technology
%A S. Jabeen Begum
%A Dr. T. Purusothaman
%T A Survey on Key Management Techniques for Wired/Wireless Networks
%J International Conference on Advanced Computer Technology
%@ 0975-8887
%V ICACT
%N 1
%P 21-24
%D 2011
%I International Journal of Computer Applications
Abstract

Providing key management schemes for large scale multicast groups has become a bottleneck due to many potential commercial applications on Internet such as stock quote and software distribution. For secure multicast communication, all the group members share a common key called as Secret Group Key. Since the member dynamics such as join or leave do not necessarily terminate the multicast session, it is important to update the Group key to all the valid members, so that the non-members do not have access to the future keys. Researchers have proposed several different approaches to the group key management. These approaches can be divided into three main classes: Centralized group key management protocols, Decentralized architectures and Distributed key management protocols. This paper surveys for both Wired and Wireless Networks.

References
  1. Paul Judge and MostafaAmmar, “Security Issues and Solutions in Multicast Content Distribution: A Survey” , Georgia Institute of Technology, 0890-8044/03/$17.00 © 2003 IEEE IEEE Network ¥ January/February 2003
  2. Xiaozhou Steve Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam, “Batch Rekeying for Secure Group Communications”, Department of Computer Sciences University of Texas at Austin Austin, TX 78712-1188.
  3. Yongdae Kim, AdrianPerrigy, Gene Tsudik, “Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups” Copyright 2000 ACM 1-58113-203-4/00/0011
  4. Kin-Ching Chan and S.-H. Gary Chan, “Distributed Servers Approach for Large-Scale Secure Multicast”, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 8, OCTOBER 2002.
  5. Michael Steiner, Gene Tsudik, Member, “Key Agreement in Dynamic Peer Groups” , IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 8, AUGUST 2000.
  6. Wei-Chi Ku Shuai-Min Chen, Fu JenCatholicUniversity, “An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees”.
  7. RiteshMukherjee ,J.William Atwood, “Proxy Encryption For Secure Multicast Key Management” , Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN’03) 0742-130/03 $ 17.00 © 2003 IEEE Proceedings.
  8. Yair Amir, John L. Schultz, “Secure Group Communication Using Robust Contributory Key Agreement”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 5, MAY 2004.
  9. Edith C.H. Ngai, Student, and Michael R. Lyu, Professor, Fellow, IEEE, Department of Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong, “Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks”.
  10. Dr. Anil Kapil, Mr. SanjeevRana, “Identity-Based Key Management in MANETs using Public Key Cryptography”, International Journal of Security (IJS), Volume (3) : Issue (1).
  11. D.Sivaganesan1 and Dr.R.Venkatesan, “PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER APPROACH” , International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010.
  12. PoojaSaini, “Impact of Mobility and Transmission Range on the Performance of Backoff Algorithms for IEEE 802.11-Based Multi-hop Mobile Ad hoc Networks”, International Journal of Advancements in Technology (IJoAT) http://ijict.org/ ISSN 0976-4860.
Index Terms

Computer Science
Information Sciences

Keywords

Key management group key wired/wireless networks