Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: El-Zoghdy, Said Fathy; | Asem, Yasser Mohammed
Affiliations: Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Kingdom of Saudi Arabia. E-mail: [email protected] | Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Kingdom of Saudi Arabia. E-mail: [email protected]
Note: [] Corresponding author. Said Fathy El-Zoghdy, E-mail: [email protected].
Abstract: The Internet multicast capabilities have been used in enormous number of groups through the Internet. However, IP multicast does not deploy any mechanisms to secure the multicast messages in these groups. A lot of research efforts have been done to secure multicast messages. The idea behind the multicast security is to share a symmetric key between group members to encrypt/decrypt the multicast messages and to change this key after any membership change. The main re-keying problem is how to exchange the new group key between the group members in a scalable and secure way. In this paper we present a new multicast re-keying approach that is based on dividing the whole group into smaller subgroups. Each subgroup in turn is organized in a logical key hierarchy tree, and each subgroup member has the inverse key values of the other members in his subgroup in order to make the subgroup re-keying in a scalable and secure way. This decomposition, the proposed approach, which is named as Key Inverse Re-keying (KIR), reduces the multicast complexity from O(n) to O(log 2m) where n is the total number of the whole group members and m is the number of members in each subgroup. The performance of KIR is compared with that of other group re-keying approaches to prove its effectiveness. The comparison is undertaken according to the computational overhead, communication overhead, storage overhead, and message size. The results show that KIR enhances the group performance in terms of computational overhead and communication overhead especially at the leave operation which represents a big problem for most of the previous group re-keying protocols.
Keywords: Multicast group re-keying, multicast security, key inverse, key tree, logical key hierarchy, KIR
DOI: 10.3233/JHS-2011-0446
Journal: Journal of High Speed Networks, vol. 18, no. 1, pp. 47-68, 2011
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]