Abstract
Mobile multicast service is an emerging technology in this decade. Incorporating security features in multicast services gives rise to overheads and computational complexities. The secure movement of members between areas gives rise to additional overheads with reduced throughput and increased complexities at the server. Designing an efficient and secure multicast model for mobile services is a challenging area for the researchers. In this paper, two models has been designed and proposed. The algorithms for these models have been experimentally simulated, tested, analyzed and compared with the already existing models. The experimental results prove that the proposed Enhanced LeaSel model has increased throughput with complexity O(1), when compared to existing models whose complexity is O(NA +1 +2n).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wong, C., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Ggraphs. IEEE/ACM Transaction on Networking 8(1), 16–30 (2000)
Elijah Blessing, R., Rhymend Uthariaraj, V.: Evaluation and Analysis of Computational Complexity for Secure Multicast Models. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 684–694. Springer, Heidelberg (2003)
Gong, G., Shacham, N.: Multicast Security and Its Extension to Mobile Environment. Wireless Networks, 81–295 (1995)
Decleene, D., Dondeti, L., et al.: Secure Group Communications for Wireless Networks. In: Proceedings of INFOCOM (2001)
Bhargava, B., et al.: Fault Tolerant Authentication and Group Key Management in Mobile Computing. CERIAS Technical Report (2000)
Berkovits, S.: How to Broadcast a Secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)
Elijah Blessing, R., Rhymend Uthariaraj, V.: Secure and Efficient Scalable Multicast Model for Online Network Games. In: Proceedings of International Conference ADCOG, pp. 8–15 (2003)
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Elijah Blessing, R., Rhymend Uthariaraj, V.: LeaSel: An Efficient Key Management Model for Scalable Secure Multicast System. In: Proceedings of International Conference ICORD (2002)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key Management for Multicast: Issues and Architectures. RFC 2627 (July 1997)
Mittra, S.: Iolus: A framework for Scalable Secure Multicasting. In: Proceedings of ACM SIGCOMM, pp. 277–288 (1997)
Harney, H., Muckenhim, C.: Group Key Management Protocol (GKMP) Architecture. RFC 2094 (July 1997)
Elijah Blessing, R., Rhymend Uthariaraj, V.: Fault Tolerant Analysis of Secure Multicast Models. Accepted for Presentation in International IEEE Conference ICICS-PCM (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blessing R., E., Uthariaraj V., R. (2004). Design of Secure Multicast Models for Mobile Services. In: Van Emde Boas, P., Pokorný, J., Bieliková, M., Štuller, J. (eds) SOFSEM 2004: Theory and Practice of Computer Science. SOFSEM 2004. Lecture Notes in Computer Science, vol 2932. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24618-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-24618-3_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20779-5
Online ISBN: 978-3-540-24618-3
eBook Packages: Springer Book Archive