CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Performance Analysis of Sponsor Selection Algorithms in Group Key Agreement

Published on December 2011 by Shital Supase, Rajesh Ingle
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 5
December 2011
Authors: Shital Supase, Rajesh Ingle
4028b651-35d0-4e98-a508-73c115e28a9e

Shital Supase, Rajesh Ingle . Performance Analysis of Sponsor Selection Algorithms in Group Key Agreement. Network Security and Cryptography. NSC, 5 (December 2011), 1-6.

@article{
author = { Shital Supase, Rajesh Ingle },
title = { Performance Analysis of Sponsor Selection Algorithms in Group Key Agreement },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /specialissues/nsc/number5/4350-spe050t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Shital Supase
%A Rajesh Ingle
%T Performance Analysis of Sponsor Selection Algorithms in Group Key Agreement
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 5
%P 1-6
%D 2011
%I International Journal of Computer Applications
Abstract

Many of the emerging group oriented, collaborative and distributed application are based on the secure group communication. The various group key agreement protocols are proposed for the same. The performance of all these group key agreement protocols depends on their performance metrics like communication cost and computation cost. In this work we present the performance analysis of STR protocol based on two different sponsor selection algorithms. These two algorithms are implemented by extending the Adaptive Middleware APIs for text conferencing application. Here we present the comparative analysis communication cost and computation cost for both algorithms.

References
  1. Rajesh Ingle, G. Sivakumar, “TGKAM: Adaptive Middleware Architecture for Secure Group Communication”, 2009 Sixth International Conference on Information Technology: New Generations
  2. Yongdae Kim, Adrian Perrig, and Gene Tsudik, “Tree-based Group Key Agreement”.
  3. Yacine Challal, Hamida Seba, “Group Key Management Protocols: A Novel Taxonomy”, INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY VOLUME 2 NUMBER 1 2005 ISSN:1305-2403
  4. Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau , “SEAL:ASecure Communication Library for Building Dynamic Group Key Agreement Applications”
  5. Yongdae Kim, Adrian Perrig, Gene Tsudik,” Group Key Agreement Efficient in Communication”, in IEEE Computer Society 2004.
  6. Yongdae Kim, Adrian Perrig, and Gene Tsudik, “Communication-Efficient Group Key Agreement”
  7. Yair Amir, Y. Kim, Cristina Nita-Rotaru, Gene Tsudik, “On the Performance of Group Key Agreement Protocols”
  8. Hemlata Narvekar, Madhumita Chatterjee, “Key Management Protocols for Wired and Wireless Ad-hoc Networks: A Comparative Analysis”, in ICSCI 2007, Hyderabad, India.
  9. William Stallings, “Cryptography and Network Security Principles and Practices”, Fourth Edition.
Index Terms

Computer Science
Information Sciences

Keywords

Security Secure group communication Group key agreement sponsor selection