A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach

نویسندگان

  • Mohamed Rasslan
  • Yasser H. Dakroury
  • Heba Kamal Aslan
چکیده

In the present paper, we propose a new protocol for a scalable multicast key distribution protocol. The proposed protocol is based on Key Management using Boolean Function Minimization (KM-BFM) technique. It is considered one of the best solutions proposed for solving the scalability of multicast security protocols depending on a centralized manager. Instead of using one tree as in KMBFM, the members are divided into a number of subgroup trees. A comparison between KM-BFM and other centralized protocols is detailed. The comparison shows that KM-BFM protocol has the lowest communication overhead. Furthermore, it has the lowest storage at the security manager. Then, a comparison between the proposed protocol and KM-BFM protocol is given. The comparison shows that the proposed protocol has lower storage requirements. Further, it achieves a lower communication overhead in case of a single member leave and a comparable communication overhead in case of multiple leaves.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques

The Internet today provides no support for privacy or authentication of multicast packets. However, an increasing number of applications will require secure multicast services in order to restrict group membership and enforce accountability of group members. A major problem associated with the deployment of secure multicast delivery services is the scalability of the key distribution protocol. ...

متن کامل

A New Secure Multicast Key Distribution Scheme Using Tabulation Method

In the present paper, we propose a new scheme for a scalable multicast key distribution scheme. The present scheme is based on the Key Management using Tabulation method of Boolean Function Simplification technique. It explores the use of batching of group membership changes to reduce the frequency, and hence the cost, of key re-distribution operations. It focuses explicitly on the issue of sno...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks

An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. This flexibility in space and time induces new challenges towards the security infrastructure needed to support secure unicast and multicast communications. Especially, traditional group key management architectures meant for wir...

متن کامل

Scalable secure one-to-many group communication using dual encryption

Multicasting is a scalable solution for group communication. Whereas secure unicast is a well-understood problem, scalable secure multicast poses several unique security problems, namely groupmembership control, scalable key distribution to a dynamic group. We address scalability in the pro-posed protocol by using hierarchical subgrouping. Third party hosts or members of the mul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2009