Abstract
This paper addresses the problem of providing secure access control in broadcast schemes in a wireless network. We consider an environment where clients subscribe to information objects sent via a broadcast onto a wireless network. In this context, a client should only be able to access its objects of interest for its subscription period, and the security system used must not be easily broken. Existing data broadcasting approaches fail to perform well with increased client loads. In this paper, we propose to use the Drop Groups (DG) protocol, that uses a novel grouping criterion. We present the broadcast organization under DG, and demonstrate that our approach is scalable. We use simulation to compare the DG protocol with existing techniques.
Similar content being viewed by others
References
S. Acharya, R. Alonso, M. Franklin and S. Zdonik, Broadcast disks: Data management for asymmetric communication environments, in: Proceedings of ACM SIGMOD, San Jose, CA (May 1995).
Y. Amir and A. Wool, Evaluating quorum systems over the Internet, in: Proceedings of 26th International Symposium on Fault-Tolerant Computing (1996) pp. 26-35.
G. Blohm, R. Parikh, E. Davis, A.R. Bhatt and A. Ware, Information dissemination via global broadcast service (GBS), in: Proceedings of MILCOM'96, McLean, VA (October 1996).
C. Blundo, A. Cresti and A. DeSantis, Space requirements for broadcast encryption, in: Proceedings of Advances in Cryptology - EUROCRYPT' 94, Perugia, Italy (May 1994).
A. Celik, Technologies to support information commerce: Dissemination of data using broadcasts, PhD thesis, University of Arizona (2001).
A. Celik and A. Datta, A scalable approach for subscription-based information commerce, in: Workshop on Electronic Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA (2000).
A. Celik, A. Datta and S. Narasimhan, Secure data delivery protocols for information commerce in a push-based environment, IEEE Transactions on Systems, Man and Cybernetics 30(4) (July 2000).
A. Datta, A. Celik, R. Wright and A. Biliris, Subscribe: Secure and efficient data delivery/access services in a push-based environment, in: Proceedings of International Conference on Telecommunications and Electronic Commerce (1998).
A. Datta, D. VanderMeer, A. Celik and V. Kumar, Adaptive broadcast protocols to support efficient and energy conserving retrieval from databases in mobile computing environments, ACM Transactions on Database Systems (TODS) 24(1) (March 1999).
A. Fiat and M. Naor, Broadcast encryption, in: Proceedings of Advances in Cryptology - CRYPTO'93, Santa Barbara, CA (August 1994) pp. 480-491.
L. Gong, New protocols for third-party-based authentication and secure broadcast, in: Proceedings of ACM Conference on Computer and Communications Security, Fairfax, VA (November 1994).
I.S. Gopal and J.M. Jaffe, Point-to-multipoint communication over broadcast links, IEEE Transactions on Communication 32(9) (1984) 1034-1044.
T. Imielinski, S. Vishwanath and B.R. Badrinath, Data on air: Organization and access, IEEE Transactions on Knowledge and Data Engineering 9(3) (May/June 1997) 353-372.
W.A. Jackson, K.M. Martin, C.M. O'Keefe, J. Pieprzyk and R. Safavi-Naini, On sharing many secrets, in: Proceedings of Advances in Cryptology - ASIACRYPT'94,Wollongong, Australia (November 1994).
Fishwick, Simulation Model Design and Execution: Building Digital Worlds (Prentice Hall, 1995).
Primark, Primark.com stock information homepage (1997) http:// www.primark.com/stock_info/stock_info.html
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatues and public key cryptosystems, Communications of the ACM 21 (February 1978) 120-126.
S.J. Shepherd, A high speed software implementation of the data encryption standard, Computers and Security 14(4) (1995) 349-357.
J. Weijia, Implementation of a reliable multicast protocol, Software - Practice and Experience 27(7) (July 1997) 813-850.
H. Yang, J. Kim, C. Kwon, D. Won, G.S. Poo and E.S. Seumahu, Veri-fiable secret sharing and multiparty protocols in distributed systems, in: Proceedings of IEEE Singapore International Conference on Networks and International Conference on Information Engineering, Singapore (July 1995).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Celik, A., Datta, A. DG: A Scalable Approach for Broadcasting Data Securely in Wireless Networks. Wireless Networks 9, 249–259 (2003). https://doi.org/10.1023/A:1022829311840
Issue Date:
DOI: https://doi.org/10.1023/A:1022829311840