Abstract
This paper presents a new approach for performance evaluation of rekeying algorithms. New system metrics related to rekeying performance are defined: Rekeying Quality of Service and Rekeying Access Control. These metrics are estimated in relation to both group size and group dynamics. A simultor prototype demonstrates the merit of this unified assessment method by means of a comprehensive case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graph. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)
Ng, W.H.D., Sun, Z.: Multi-Layers Balanced LKH. In: Proc. of IEEE Int. Conf. on Communication ICC, pp. 1015–1019 (May 2005)
Li, X.S., Yang, Y.R., Gouda, M., Lam, S.S.: Batch Rekeying for Secure Group Communications. In: Proc. ACM 10th Int. World Wide Web Conf., Hong Kong (May 2001)
Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the Performance of Group Key Agreement Protocols. ACM Trans. on Information Systems Security 7(3), 457–488 (2004)
Pegueroles, J., Rico-Novella, F.: Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation. In: Proc. IEEE Symp. on Computers and Communications, p. 815 (2003)
Chen, W., Dondeti, L.R.: Performance Comparison of Stateful and Stateless Group Rekeying Algorithms. In: Proc. of Int. Workshop in Networked Group Communication (2002)
Sherman, A., McGrew, D.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Trans. on Software Engineering 29(5), 444–458 (2003)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE J. on Selected Areas in Communications 17(8), 1614–1631 (1999)
Lu, H.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Trans. on Computers 54(2), 214–224 (2005)
Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. of ACM SIGCOMM, Cannes, France, pp. 277–288 (September 1997)
Moyer, M.J., Tech, G., Rao, J.R., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast, Internet draft (June 1999), http://www.securemulticast.org/draft-irtf-smug-key-tree-balance-00.txt
Moharrum, M., Mukkamala, R., Eltoweissy, M.: Efficient Secure Multicast with Well-Populated Multicast Key Trees. In: Proc. of IEEE ICPADS, p. 214 (July 2004)
Rodeh, O., Birman, K.P., Dolev, D.: Using AVL Trees for Fault Tolerant Group Key Management, Tech. Rep. 2000-1823, Cornell University (2000)
Goshi, J., Ladner, R.E.: Algorithms for Dynamic Multicast Key Distribution Trees. In: Proc. of ACM Symp. on Principles of Distributed Computing, pp. 243–251 (2003)
Almeroth, K.C., Ammar, M.H.: Collecting and Modeling the join/leave Behavior of Multicast Group Members in the MBone. In: Proc. of HPDC, pp. 209–216 (1996)
NIST (National Institute of Standards and Technology), Advanced Encryption Standard (AES), Federal Information Processing Standard 197 (November 2001)
Shoufan, A., Laue, R., Huss, S.A.: High-Flexibility Rekeying Processor for Key Management in Secure Multicast. In: IEEE Int. Symposium on Embedded Computing SEC 2007, Niagara Falls, Canada (May 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shoufan, A., Arul, T. (2010). Multicast Rekeying: Performance Evaluation. In: Biedermann, A., Molter, H.G. (eds) Design Methodologies for Secure Embedded Systems. Lecture Notes in Electrical Engineering, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16767-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16767-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16766-9
Online ISBN: 978-3-642-16767-6
eBook Packages: EngineeringEngineering (R0)