Skip to main content
Log in

DG: A Scalable Approach for Broadcasting Data Securely in Wireless Networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper addresses the problem of providing secure access control in broadcast schemes in a wireless network. We consider an environment where clients subscribe to information objects sent via a broadcast onto a wireless network. In this context, a client should only be able to access its objects of interest for its subscription period, and the security system used must not be easily broken. Existing data broadcasting approaches fail to perform well with increased client loads. In this paper, we propose to use the Drop Groups (DG) protocol, that uses a novel grouping criterion. We present the broadcast organization under DG, and demonstrate that our approach is scalable. We use simulation to compare the DG protocol with existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Acharya, R. Alonso, M. Franklin and S. Zdonik, Broadcast disks: Data management for asymmetric communication environments, in: Proceedings of ACM SIGMOD, San Jose, CA (May 1995).

  2. Y. Amir and A. Wool, Evaluating quorum systems over the Internet, in: Proceedings of 26th International Symposium on Fault-Tolerant Computing (1996) pp. 26-35.

  3. G. Blohm, R. Parikh, E. Davis, A.R. Bhatt and A. Ware, Information dissemination via global broadcast service (GBS), in: Proceedings of MILCOM'96, McLean, VA (October 1996).

  4. C. Blundo, A. Cresti and A. DeSantis, Space requirements for broadcast encryption, in: Proceedings of Advances in Cryptology - EUROCRYPT' 94, Perugia, Italy (May 1994).

  5. A. Celik, Technologies to support information commerce: Dissemination of data using broadcasts, PhD thesis, University of Arizona (2001).

  6. A. Celik and A. Datta, A scalable approach for subscription-based information commerce, in: Workshop on Electronic Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA (2000).

  7. A. Celik, A. Datta and S. Narasimhan, Secure data delivery protocols for information commerce in a push-based environment, IEEE Transactions on Systems, Man and Cybernetics 30(4) (July 2000).

  8. A. Datta, A. Celik, R. Wright and A. Biliris, Subscribe: Secure and efficient data delivery/access services in a push-based environment, in: Proceedings of International Conference on Telecommunications and Electronic Commerce (1998).

  9. A. Datta, D. VanderMeer, A. Celik and V. Kumar, Adaptive broadcast protocols to support efficient and energy conserving retrieval from databases in mobile computing environments, ACM Transactions on Database Systems (TODS) 24(1) (March 1999).

  10. A. Fiat and M. Naor, Broadcast encryption, in: Proceedings of Advances in Cryptology - CRYPTO'93, Santa Barbara, CA (August 1994) pp. 480-491.

  11. L. Gong, New protocols for third-party-based authentication and secure broadcast, in: Proceedings of ACM Conference on Computer and Communications Security, Fairfax, VA (November 1994).

  12. I.S. Gopal and J.M. Jaffe, Point-to-multipoint communication over broadcast links, IEEE Transactions on Communication 32(9) (1984) 1034-1044.

    Google Scholar 

  13. T. Imielinski, S. Vishwanath and B.R. Badrinath, Data on air: Organization and access, IEEE Transactions on Knowledge and Data Engineering 9(3) (May/June 1997) 353-372.

    Google Scholar 

  14. W.A. Jackson, K.M. Martin, C.M. O'Keefe, J. Pieprzyk and R. Safavi-Naini, On sharing many secrets, in: Proceedings of Advances in Cryptology - ASIACRYPT'94,Wollongong, Australia (November 1994).

  15. Fishwick, Simulation Model Design and Execution: Building Digital Worlds (Prentice Hall, 1995).

  16. Primark, Primark.com stock information homepage (1997) http:// www.primark.com/stock_info/stock_info.html

  17. R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatues and public key cryptosystems, Communications of the ACM 21 (February 1978) 120-126.

  18. S.J. Shepherd, A high speed software implementation of the data encryption standard, Computers and Security 14(4) (1995) 349-357.

    Google Scholar 

  19. J. Weijia, Implementation of a reliable multicast protocol, Software - Practice and Experience 27(7) (July 1997) 813-850.

  20. H. Yang, J. Kim, C. Kwon, D. Won, G.S. Poo and E.S. Seumahu, Veri-fiable secret sharing and multiparty protocols in distributed systems, in: Proceedings of IEEE Singapore International Conference on Networks and International Conference on Information Engineering, Singapore (July 1995).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Celik, A., Datta, A. DG: A Scalable Approach for Broadcasting Data Securely in Wireless Networks. Wireless Networks 9, 249–259 (2003). https://doi.org/10.1023/A:1022829311840

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1022829311840

Navigation