CFP last date
20 January 2025
Reseach Article

Multiple Operations for Secure Multicast Communication

by Manisha Manjul, Rajesh Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 7
Year of Publication: 2014
Authors: Manisha Manjul, Rajesh Mishra
10.5120/14998-3077

Manisha Manjul, Rajesh Mishra . Multiple Operations for Secure Multicast Communication. International Journal of Computer Applications. 86, 7 ( January 2014), 26-30. DOI=10.5120/14998-3077

@article{ 10.5120/14998-3077,
author = { Manisha Manjul, Rajesh Mishra },
title = { Multiple Operations for Secure Multicast Communication },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 7 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number7/14998-3077/ },
doi = { 10.5120/14998-3077 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:36.292164+05:30
%A Manisha Manjul
%A Rajesh Mishra
%T Multiple Operations for Secure Multicast Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 7
%P 26-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Group key management is a critical task to make the secure multicast application. Group manager is responsible for changing and re-distributing (rekeying) the group key whenever it deems necessary. Many applications will require a security infrastructure that ensures multiple levels of access control for group members and also require very fast rekeying so that it is not disruptive to their performance. We use a multi-operation key management scheme that achieves hierarchical group access control. Particularly, we use an integrated key graph that maintains keying material for all members with different access privileges. It also incorporates new functionalities that are not present in conventional multicast key management, such as user relocation on the key graph. We use the ECC-GKM elliptic curve cryptosystem for the key exchange and we show the multiple operations such as joining, leaving and switching for multiple levels of access control.

References
  1. Wenbo Sh and Peng Gong, "A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography", International Journal of Distributed Sensor Networks Volume 2013 (2013), PP 1- 7.
  2. H. Debiao, C. Jianhua, and H. Jin, "An Id-Based Client Authentication With Key Agreement Protocol For Mobile Client-Server Environment On Ecc With Provable Security," Information Fusion, vol. 13, no. 3, pp. 223–230, 2012.
  3. Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII Transactions On Internet And Information Systems, Vol. 6, No. 12, pp. 3352-3365, Dec 2012.
  4. Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No. 6, pp. 689-705, 2010.
  5. Yan , Sun "Hierarchical Group Access Control for Secure Multicast Communication " IEEE 2007
  6. Y. Mao, Y. Sun, M. Wu, and K. J. R. Liu, "JET: Dynamic joint-exist-tree amortization and scheduling for contributory key agreement," IEEE/ACM Trans. Netw. , vol. 14, no. 5, pp. 1128–1140, Oct. 2006.
  7. W. Trappe, Y. Wang, and K. J. R. Liu, "Resource-aware conference key establishment for heterogeneous networks," IEEE/ACM Trans. Netw. , vol. 13, no. 1, pp. 134–146, Feb. 2005.
  8. Y. Sun and K. J. R. Liu, "Scalable Hierarchical Access Control in Secure Group Communications," in Proc. IEEE INFOCOM, Mar. 2004.
  9. Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Netw. , vol. 12, no. 4, pp. 653–666, Aug. 2004.
  10. B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communications," in Proc. IEEE Int. Conf. Commun. (ICC), 2002, vol. 2, pp. 1159–1163.
  11. A. Perrig and J. D. Tygar, Secure Broadcast Communication: In Wired and Wireless Networks. Norwell, MA: Kluwer, 2002.
  12. S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE J. Sel. Areas Commun. , vol. 20, no. 8, pp. 1511–1527, Oct. 2002.
  13. Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: A performance analysis," in Proc. 2001 Conf. Applications, Technologies, Architectures, Protocols For Comput. Commun. , Aug. 2001, pp. 27–38.
  14. A. Perrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in Proc. IEEE Symp. Security Privacy, 2001, pp. 247–262.
  15. W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE ICASSP'01, May 2001, p. 1449–1452.
Index Terms

Computer Science
Information Sciences

Keywords

Multicast Group Key Management Access Control Elliptic Curve Cryptography