Skip to main content

Design of Secure Multicast Models for Mobile Services

  • Conference paper
SOFSEM 2004: Theory and Practice of Computer Science (SOFSEM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2932))

  • 428 Accesses

Abstract

Mobile multicast service is an emerging technology in this decade. Incorporating security features in multicast services gives rise to overheads and computational complexities. The secure movement of members between areas gives rise to additional overheads with reduced throughput and increased complexities at the server. Designing an efficient and secure multicast model for mobile services is a challenging area for the researchers. In this paper, two models has been designed and proposed. The algorithms for these models have been experimentally simulated, tested, analyzed and compared with the already existing models. The experimental results prove that the proposed Enhanced LeaSel model has increased throughput with complexity O(1), when compared to existing models whose complexity is O(NA +1 +2n).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wong, C., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Ggraphs. IEEE/ACM Transaction on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  2. Elijah Blessing, R., Rhymend Uthariaraj, V.: Evaluation and Analysis of Computational Complexity for Secure Multicast Models. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 684–694. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Gong, G., Shacham, N.: Multicast Security and Its Extension to Mobile Environment. Wireless Networks, 81–295 (1995)

    Google Scholar 

  4. Decleene, D., Dondeti, L., et al.: Secure Group Communications for Wireless Networks. In: Proceedings of INFOCOM (2001)

    Google Scholar 

  5. Bhargava, B., et al.: Fault Tolerant Authentication and Group Key Management in Mobile Computing. CERIAS Technical Report (2000)

    Google Scholar 

  6. Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)

    Google Scholar 

  7. Elijah Blessing, R., Rhymend Uthariaraj, V.: Secure and Efficient Scalable Multicast Model for Online Network Games. In: Proceedings of International Conference ADCOG, pp. 8–15 (2003)

    Google Scholar 

  8. Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Google Scholar 

  9. Elijah Blessing, R., Rhymend Uthariaraj, V.: LeaSel: An Efficient Key Management Model for Scalable Secure Multicast System. In: Proceedings of International Conference ICORD (2002)

    Google Scholar 

  10. Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. RFC 2627 (July 1997)

    Google Scholar 

  11. Mittra, S.: Iolus: A framework for Scalable Secure Multicasting. In: Proceedings of ACM SIGCOMM, pp. 277–288 (1997)

    Google Scholar 

  12. Harney, H., Muckenhim, C.: Group Key Management Protocol (GKMP) Architecture. RFC 2094 (July 1997)

    Google Scholar 

  13. Elijah Blessing, R., Rhymend Uthariaraj, V.: Fault Tolerant Analysis of Secure Multicast Models. Accepted for Presentation in International IEEE Conference ICICS-PCM (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blessing R., E., Uthariaraj V., R. (2004). Design of Secure Multicast Models for Mobile Services. In: Van Emde Boas, P., Pokorný, J., Bieliková, M., Štuller, J. (eds) SOFSEM 2004: Theory and Practice of Computer Science. SOFSEM 2004. Lecture Notes in Computer Science, vol 2932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24618-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24618-3_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20779-5

  • Online ISBN: 978-3-540-24618-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics