Abstract
Multicast is a one to the group communication which have various challenges such as group key management, multicast receiver access control, multicast finger printing and multicast source authentication. Various protocols introduced by many researchers to minimize the lacks such as computational, communication, message size and storage overheads for group key management, but these proposed methods still have some lack as discussed above, while rekeying cost is also not less. Therefore to provide a solution of existing problem after leaving a group, there is a need for efficient and improved mechanism for group key management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Je, D.-H., Lee, J.-S., Park, Y., Seo, S.-W.: Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications 33(2), 136–148 (2010)
Pour, A.N., Kumekawa, K., Kato, T., Itoh, S.: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Elsevier, Computer Networks 51(17), 4727–4743 (2007)
Chen, X., Ma, B.N.W., Yang, C.: M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Computers & Security 26(3), 238–245 (2007)
Sun, Y(L.), Ray Liu, K.J.: Hierarchical Group Access Control for Secure Multicast Communications. IEEE/ACM Transactions on Networking 15(6) (December 2007)
Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups. IEEE/ACM Transactions on Networking 14(2) (April 2006)
Abdellatif, R., Aslan, H.K., Elramly, S.H.: New Real Time Multicast Authentication Protocol. International Journal of Network Security 12(1), 13–20 (2011)
Zheng, S., Manz, D., Alves-Foss, J.: A communication computation efficient group key algorithm for large and dynamic groups. Elsevier, Computer Networks 51(1), 69–93 (2007)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999), RFC 2627
Saroit, I.A., El-Zoghdy, S.F., Matar, M.: A Scalable and Distributed Security Protocol for Multicast Communications. International Journal of Network Security 12(2), 61–74 (2011)
Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: Multicast Security (MSEC) Group Key Management Architecture. RFC 4046 (April 2005)
Challal, Y., Seba, H.: Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology 2(1) (2005) Issn: 1305-2403
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)
Jabeenbegum, S., Purusothaman, T., Karthi, M., Balachandar, N., Arunkumar, N.: An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks. IJCSNS International Journal of Computer Science and Network Security 10(2) (February 2010)
Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Chidambaram Kalimuthu, R., Dharmaraj, R.: Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security 11(1), 33–38 (2010)
Ng, W.H.D., Howarth, M., Sun, Z., Cruickshank, H.: Dynamic Balanced Key Tree Management for Secure Multicast Communications. IEEE Transactions on Computers 56, 590–605 (2007)
Lu, H.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Transactions on Computers 54, 214–224 (2005)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and architectures. National Security Agency (June 1999), RFC 2627
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS). Protocol Version 1.1 (April 2006), RFC 2346
Stinson, D.R.: Cryptography Theory and Practice”, Second edition. Chapman and Hall/CRC Press, 155–175 (2002)
Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial in User Service (RADIUS) (June 2000), RFC 2865
Deering, S.: Host Extensions for IP Multicasting. RFC 1112 (August 1989)
Tanenbaum, A.: Computer Networks, 4th edn. Prentice Hall (2009)
Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn., p. 592 (November 16, 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Manjul, M., Kumar, R., Mishra, R. (2013). Security Improvement in Group Key Management. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_76
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)