Skip to main content

Abstract

Multicast is a one to the group communication which have various challenges such as group key management, multicast receiver access control, multicast finger printing and multicast source authentication. Various protocols introduced by many researchers to minimize the lacks such as computational, communication, message size and storage overheads for group key management, but these proposed methods still have some lack as discussed above, while rekeying cost is also not less. Therefore to provide a solution of existing problem after leaving a group, there is a need for efficient and improved mechanism for group key management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Je, D.-H., Lee, J.-S., Park, Y., Seo, S.-W.: Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications 33(2), 136–148 (2010)

    Google Scholar 

  2. Pour, A.N., Kumekawa, K., Kato, T., Itoh, S.: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Elsevier, Computer Networks 51(17), 4727–4743 (2007)

    Article  MATH  Google Scholar 

  3. Chen, X., Ma, B.N.W., Yang, C.: M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Computers & Security 26(3), 238–245 (2007)

    Article  Google Scholar 

  4. Sun, Y(L.), Ray Liu, K.J.: Hierarchical Group Access Control for Secure Multicast Communications. IEEE/ACM Transactions on Networking 15(6) (December 2007)

    Google Scholar 

  5. Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups. IEEE/ACM Transactions on Networking 14(2) (April 2006)

    Google Scholar 

  6. Abdellatif, R., Aslan, H.K., Elramly, S.H.: New Real Time Multicast Authentication Protocol. International Journal of Network Security 12(1), 13–20 (2011)

    Google Scholar 

  7. Zheng, S., Manz, D., Alves-Foss, J.: A communication computation efficient group key algorithm for large and dynamic groups. Elsevier, Computer Networks 51(1), 69–93 (2007)

    Article  MATH  Google Scholar 

  8. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999), RFC 2627

    Google Scholar 

  9. Saroit, I.A., El-Zoghdy, S.F., Matar, M.: A Scalable and Distributed Security Protocol for Multicast Communications. International Journal of Network Security 12(2), 61–74 (2011)

    Google Scholar 

  10. Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: Multicast Security (MSEC) Group Key Management Architecture. RFC 4046 (April 2005)

    Google Scholar 

  11. Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology 2(1) (2005) Issn: 1305-2403

    Google Scholar 

  12. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)

    Google Scholar 

  13. Jabeenbegum, S., Purusothaman, T., Karthi, M., Balachandar, N., Arunkumar, N.: An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks. IJCSNS International Journal of Computer Science and Network Security 10(2) (February 2010)

    Google Scholar 

  14. Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Chidambaram Kalimuthu, R., Dharmaraj, R.: Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security 11(1), 33–38 (2010)

    Google Scholar 

  15. Ng, W.H.D., Howarth, M., Sun, Z., Cruickshank, H.: Dynamic Balanced Key Tree Management for Secure Multicast Communications. IEEE Transactions on Computers 56, 590–605 (2007)

    Article  MathSciNet  Google Scholar 

  16. Lu, H.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Transactions on Computers 54, 214–224 (2005)

    Article  Google Scholar 

  17. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  18. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and architectures. National Security Agency (June 1999), RFC 2627

    Google Scholar 

  19. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS). Protocol Version 1.1 (April 2006), RFC 2346

    Google Scholar 

  20. Stinson, D.R.: Cryptography Theory and Practice”, Second edition. Chapman and Hall/CRC Press, 155–175 (2002)

    Google Scholar 

  21. Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial in User Service (RADIUS) (June 2000), RFC 2865

    Google Scholar 

  22. Deering, S.: Host Extensions for IP Multicasting. RFC 1112 (August 1989)

    Google Scholar 

  23. Tanenbaum, A.: Computer Networks, 4th edn. Prentice Hall (2009)

    Google Scholar 

  24. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., p. 592 (November 16, 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Manjul, M., Kumar, R., Mishra, R. (2013). Security Improvement in Group Key Management. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics