Abstract
Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM (Key Tree in Overlay Multicast). We described the operations of KTOM and compare the performance with other schemes, namely, host-to-host encryption, whole group encryption and SOT scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–29 (2000)
Yiu, W.-P.K., Chan, S.-H.G.: SOT: Secure Overlay Tree for Application Layer Multicast. In: IEEE International Conference on Communications, June 2004, vol. 3, pp. 20–24 (2004)
Abad, C., Gupta, I., Yurcik, W.: Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. In: IEEE International Conference on Distributed Computing Systems Workshops, June 2005, pp. 5–11 (2005)
Ganjam, A., Zhang, H.: Internet multicast video delivery. In: Proceedings of the IEEE, vol. 93, pp. 159–170 (2005)
El-Sayed, A., Roca, V., Mathy, L.: A Survey of Proposals for an Alternative Group Communication Service. In: IEEE Network, vol. 17, pp. 46–51 (2003)
Chan, K., Chan, S.-H.G.: Key Management Approaches to Offer Data Confidentiality for Secure Multicast. In: IEEE Network, vol. 17, pp. 30–39 (2003)
Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proceedings of ACM Sigcomm, pp. 277–288 (1997)
Francis, P.: “Yoid: Extending the Internet Multicast Architecture,” Technical Report, ACIRI (April 2000)
Zhang, B., Jamin, S., Zhang, L.: Host Multicast: A Framework for Delivering Multicast to End Users. In: INFOCOM, vol. 3, pp. 1366–1375 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roh, JH., Lee, KH. (2005). Key Management for Secure Overlay Multicast. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_29
Download citation
DOI: https://doi.org/10.1007/11599548_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30855-3
Online ISBN: 978-3-540-32424-9
eBook Packages: Computer ScienceComputer Science (R0)