TKS: a transition key management scheme for secure application level multicast

نویسندگان

  • Hatem Bettahar
  • Mothanna Alkubeily
  • Abdelmadjid Bouabdallah
چکیده

The Application Level Multicast (ALM) simplifies the implementation of group communication. However, it still suffer from the same management overhead in case of highly dynamic sessions. In this paper, we propose an efficient key management protocol, called Transition Key Scheme (TKS), for ALM communication. TKS aims to reduce the key management overhead in case of highly dynamic membership sessions by using a unique Traffic Encryption Key (TEK), for the group, and a small number of individual transition keys to temporally manage members who recently joined the group. Simulation results confirm that TKS reduces significantly key management overhead, compared to other existing ALM key management protocols. In addition, we validated our scheme using AVISPA validation tool, and the results show that TKS is safe against intruder attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol

The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership j...

متن کامل

Enhancement of Hierarchical Key Management Scheme of Secure Multicast Transmission for Overlay Networks

Group communication security is needed to protect sensitive information. A group key is shared by all users under secure group communication model. The group key is used to encrypt data transmitted to the group. The group membership is dynamic and requires new key for membership changes. Secure multicast transmission schemes are used to transfer data to a set of nodes. Membership in secure mult...

متن کامل

AN EFFICIENT AND SECURE GROUP KEY MANAGEMENT SCHEME IN MULTICAST NETWORK USING CLIKEv2

Group key management plays a vital role in group communication. Secure group communication can be achieved by the use of group key. Several group key management schemes have been proposed. This paper proposes an efficient and secure group key management scheme in a multicast network for achieving a secure communication between members of a group as well as ensuring better forward and backward s...

متن کامل

A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management...

متن کامل

Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks

Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJSN

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009