Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Survey of security services on group communications

Survey of security services on group communications

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Secure group communication (SGC) has attracted much attention, as group-oriented communications have been increasingly facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Of all proposals reported, most have focused on addressing the issue of key management to SGC systems. The authors, however, advocate that security services are also needed to satisfy different security requirements of various applications. The authors also present here a survey on recent advances in several security requirements and security services in group communication systems (GCSs), illustrate some outstanding GCSs that deploy these security services, and describe challenges for any future research works in designing a secure GCS.

References

    1. 1)
      • Ateniese, G., Camenisch, J., Joyce, M., Tsudik, G.: `A practical and provably secure coalition-resistant group signature scheme', Proc. IEEE CRYPTO 2000, August 2000, Santa Barbara, California, p. 255–270.
    2. 2)
      • Grosch, C.: `Framework for anonymity in IP-multicast environments', Proc. IEEE GLOBECOM 2000, December 2000, San Francisco, California, p. 365–369.
    3. 3)
      • Chaddoud, G., Varadharajan, V.: `Efficient secure group management for SSM', Proc. IEEE ICC 2004, June 2004, Paris, France, p. 1436–1440.
    4. 4)
      • P.F. Syverson , D.M. Goldschlag , M.G. Reed . Anonymous connections and onion routing. IEEE JSAC , 4 , 44 - 53
    5. 5)
      • Zhang, Q., Wang, Y.: `A centralized key management scheme for hierarchical access control', Proc. IEEE GLOBECOM 2004, December 2004, Dallas, Texas, p. 2067–2071.
    6. 6)
      • S. Dolev , R. Ostrovsky . XOR-trees for efficient anonymous multicast and reception. ACM TISSEC 2000 , 2 , 63 - 84
    7. 7)
      • L. Xiao , Y. Liu , W. Gu , D. Xuan , X. Liu . A design of overlay anonymous multicast protocol. ACM J. Parallel Distrib. Comput., Spec. Issue Security Grid Distrib. Syst. , 9 , 1205 - 1216
    8. 8)
      • Chen, Z., Huang, J., Huang, D., Jianhong, Z., Yumin, W.: `Provably secure and ID-based group signature scheme', Proc. IEEE AINA 2004, March 2004, Fukuoka, Japan, p. 384–387.
    9. 9)
      • T. Hardjono , B. Weis . The multicast group security architecture.
    10. 10)
      • Shin, S., Fathi, H., Kobara, K., Imai, H.: `A secure group communication framework in private personal area networks (P-PANs)', Proc. ICWMC 2007, March 2007, Guadeloupe, French Caribbean, p. 59–67.
    11. 11)
      • Li, T., Lam, K.-Y.: `A secure group solution for multi-agent EC system', Proc. IPDPS 2001, April 2001, San Francisco, CA, p. 1749–1756.
    12. 12)
      • Shim, Y.-C.: `A new approach for secure multicast routing in a large scale network', Proc. ICICS 2001, November 2001, Xian, China, p. 95–106.
    13. 13)
      • Y. Amir , Y. Kim , C.N. Rotaru , J.L. Schultz , J. Stanton , G. Tsudik . Secure group communication using robust contributory key agreement. IEEE Trans. Parallel Distrib. Syst. , 5 , 468 - 480
    14. 14)
      • Y. Sun , K.J.R. Liu . Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Netw. , 6 , 1514 - 1526
    15. 15)
      • N.-Y. Lee . Threshold signature scheme with multiple signing policies. Proc. IEE Comput. Digit. Tech. , 2 , 95 - 99
    16. 16)
      • M.K. Reiter , A.D. Rubin . Crowds: anonymity for web transactions. ACM TISSEC 1998 , 1 , 66 - 92
    17. 17)
      • C.K. Wong , M. Gouda , S.S. Lam . Secure group communications using key graphs. IEEE/ACM Trans. Network. , 1 , 16 - 30
    18. 18)
      • P. Sakarindr , N. Ansari . Security services in group communications over wireless infrastructure, mobile ad-hoc, and wireless sensor network. IEEE Wirel. Commun. Mag., Spec. Issue Security Wirel. Mobile Ad Hoc Sensor Netw. , 5 , 8 - 20
    19. 19)
      • S. Banerjee , B. Bhattacharjee . Scalable secure group communication over IP multicast. IEEE JSAC , 8 , 1511 - 1527
    20. 20)
      • Shields, C., Garcia-Luna Aceves, J.J.: `KHIP: a scalable protocol for secure multicast routing', Proc. ACM SIGCOMM 1999, September 1999, Cambridge, Massachusetts, p. 53–64.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0261
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0261
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address