International Conference on Advanced Computer Technology |
Foundation of Computer Science USA |
ICACT - Number 1 |
August 2011 |
Authors: S. Jabeen Begum, Dr. T. Purusothaman |
314c97c1-13b7-47a6-aebf-17cb748c7c1d |
S. Jabeen Begum, Dr. T. Purusothaman . A Survey on Key Management Techniques for Wired/Wireless Networks. International Conference on Advanced Computer Technology. ICACT, 1 (August 2011), 21-24.
Providing key management schemes for large scale multicast groups has become a bottleneck due to many potential commercial applications on Internet such as stock quote and software distribution. For secure multicast communication, all the group members share a common key called as Secret Group Key. Since the member dynamics such as join or leave do not necessarily terminate the multicast session, it is important to update the Group key to all the valid members, so that the non-members do not have access to the future keys. Researchers have proposed several different approaches to the group key management. These approaches can be divided into three main classes: Centralized group key management protocols, Decentralized architectures and Distributed key management protocols. This paper surveys for both Wired and Wireless Networks.