CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Cluster based Cost Effective Group Key Management Protocol for Multicast Network

Published on December 2013 by Saravana Kumar N M, Ramachandran, Lavanya S
International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
Foundation of Computer Science USA
ICIIIOES - Number 9
December 2013
Authors: Saravana Kumar N M, Ramachandran, Lavanya S
fd420057-4d89-4e47-a822-9981537ed979

Saravana Kumar N M, Ramachandran, Lavanya S . A Cluster based Cost Effective Group Key Management Protocol for Multicast Network. International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences. ICIIIOES, 9 (December 2013), 22-30.

@article{
author = { Saravana Kumar N M, Ramachandran, Lavanya S },
title = { A Cluster based Cost Effective Group Key Management Protocol for Multicast Network },
journal = { International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences },
issue_date = { December 2013 },
volume = { ICIIIOES },
number = { 9 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 22-30 },
numpages = 9,
url = { /proceedings/iciiioes/number9/14345-1652/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%A Saravana Kumar N M
%A Ramachandran
%A Lavanya S
%T A Cluster based Cost Effective Group Key Management Protocol for Multicast Network
%J International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%@ 0975-8887
%V ICIIIOES
%N 9
%P 22-30
%D 2013
%I International Journal of Computer Applications
Abstract

Key management plays a very important role in the data communications. CBCEGKM is a key management scheme that provides more efficient and secure methods for key generation and utilization. This papers deals with the analysis of CBCEGKM with respect to communication overhead, computation cost, etc. The analysis shows that CBCEGKM comprises of the most reliable methods for key generations and hence, the data communication. CBCEGKM is compared to some of the other key management techniques and proved to be the better choice in this paper.

References
  1. N. M. Saravana Kumar and T. Purusothaman, "CBCEGKM: Scalable and Efficient Group Key Management Scheme in Multicast Networks". European Journal of Scientific Research, ISSN 1450-216X Vol. 89 No 3 October, 2012, pp. 394-408.
  2. R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, 2010. Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security, Vol. 11, No. 1, PP. 33{38).
  3. Mingyan, Li. , R. Poovendran, C. Berenstein, 2002. Design of Secure Multicast Key Management Schemes With Communication Budget Constraint. IEEE Communications Letters, Vol. 6, No. 3.
  4. Pitipatana, S. , Nirwan A. , 2007. Elliptic Curve Cryptosystem-Based Group Key Management For Secure Group Communications. IEEE Military Communications Conference doi: 10. 1109/MILCOM. 2007. 4455002.
  5. E. Munivel, J. Lokesh,"Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory". CIMCA, IAWTIC, and ISE. 2008
  6. S. Jabeen Begum and Dr. T. Purusothaman, 2011. A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication. Journal of Computer Science 7 (3): 328-340.
  7. Xukai Zou, Byrav Ramamurthy, Spyros Magliveras, 2002. Efficient Key Management f or Secure Group Communications with Bursty Behavior. In Proceedings of the IASTED International Conference. Communications, Internet, and Information Technology
  8. Shu-Quan Li, Yue Wu, "A Survey on Key Management for Multicast". Second International Conference on Information Technology and Computer Science, 2010
  9. Bibo Jiang, Xiulin Hu, "A Survey of Group Key Management". International Conference on Computer Science and Software Engineering. 2008
  10. T. Srinivasan, S. Sathish, R. Vi,jay Kumar, M. V. B. Vi,jayender, "A Hybrid Scalable Group Key Management Approach for Large Dynamic Multicast Networks". The Sixth IEEE International Conference on Computer and Information Technology. 2006.
  11. Senthamil Ilango, Johnson Thomas, "Group Key Management utilizing Hu?man and Petrick based approaches". Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04). 2004.
  12. "Di?e-Hellman Key Exchange". www. math. brown. edu/~jhs/ MathCrypto/SampleSections. pdf.
  13. Liming Wang, Chuan-Kun Wu, "Efficient Key Agreement for Large and Dynamic Multicast Groups". International Journal of Network Security, Vol. 3, No. 1, PP . 8–17, July 2006 http://isrc. nchu. edu. tw/ijns/
  14. J. Lakshmanaperumal, K. Thanushkodi, N. M. Saravana kumar, K. Saravanan, K. Saravanan, T. Purusothaman "Efficient Key Management Scheme for Secure Multicast in MANET". IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 11, November 2010.
  15. Mohamed-Salah Bouassida, Isabelle Chrisment, Olivier Festor, "Group Key Management in MANETs". International Journal of Network Security, Vol. 6, No. 1, PP . 67–79, Jan. 2008.
  16. Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, Heba K. Aslan, "A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach". International Journal of Network Security, Vol. 8, No. 1, PP . 75–89, Jan. 2009.
  17. Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar, "A Scalable and Distributed Security Protocol for Multicast Communications". International Journal of Network Security, Vol. 12, No. 2, PP. 61{74, Mar. 2011.
  18. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, "Key management for high bandwidth secure multicast". Journal of Computer Security, 693–709, 2004.
  19. Steven Pigeon, "Hu?man Coding". http://www. stevenpigeon. com/Publications/publications/HuffmanChapter. pdf
  20. Anil Kapil, Sanjeev Rana, "Identity-Based Key Management in MANETs using Public Key Cryptography". International Journal of Security (I,JS), Vol(3), Issue(1), 2009.
  21. A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, "Proactive Secret Sharing or How to COpe with Perpetual Leakage". CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp-339-352, Springer-Verlag
  22. David A, McGrew and Alan T. Sherman, 2003. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, doi: 10. 1109/TSE. 2003. 1199073
  23. M . V. Vijaya Saradhi and B H. Ravi Krishna 2009. A group key management approach for multicast cryptosystems. Journal of Theoretical and Applied Information Technology.
  24. Pavithira Loganathan and T. Purushothaman 2011. An Energy Efficient Topology Aware Key Management Scheme for Multicasting in Ad-hoc Networks. International Journal of Wisdom Based Computing, Vol. 1 (3).
  25. Panja. B, Madria. S. K, Bhargava. B, "Energy and communication e?cient group key management protocol for hierarchical sensor networks". IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol(1), 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Key Management Multicast Public-private Key Rsa Rekey.