Skip to main content

Multicast Rekeying: Performance Evaluation

  • Conference paper
Design Methodologies for Secure Embedded Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 78))

  • 835 Accesses

Abstract

This paper presents a new approach for performance evaluation of rekeying algorithms. New system metrics related to rekeying performance are defined: Rekeying Quality of Service and Rekeying Access Control. These metrics are estimated in relation to both group size and group dynamics. A simultor prototype demonstrates the merit of this unified assessment method by means of a comprehensive case study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graph. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  2. Ng, W.H.D., Sun, Z.: Multi-Layers Balanced LKH. In: Proc. of IEEE Int. Conf. on Communication ICC, pp. 1015–1019 (May 2005)

    Google Scholar 

  3. Li, X.S., Yang, Y.R., Gouda, M., Lam, S.S.: Batch Rekeying for Secure Group Communications. In: Proc. ACM 10th Int. World Wide Web Conf., Hong Kong (May 2001)

    Google Scholar 

  4. Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the Performance of Group Key Agreement Protocols. ACM Trans. on Information Systems Security 7(3), 457–488 (2004)

    Article  Google Scholar 

  5. Pegueroles, J., Rico-Novella, F.: Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation. In: Proc. IEEE Symp. on Computers and Communications, p. 815 (2003)

    Google Scholar 

  6. Chen, W., Dondeti, L.R.: Performance Comparison of Stateful and Stateless Group Rekeying Algorithms. In: Proc. of Int. Workshop in Networked Group Communication (2002)

    Google Scholar 

  7. Sherman, A., McGrew, D.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Trans. on Software Engineering 29(5), 444–458 (2003)

    Article  Google Scholar 

  8. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE J. on Selected Areas in Communications 17(8), 1614–1631 (1999)

    Article  Google Scholar 

  9. Lu, H.: A Novel High-Order Tree for Secure Multicast Key Management. IEEE Trans. on Computers 54(2), 214–224 (2005)

    Article  Google Scholar 

  10. Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. of ACM SIGCOMM, Cannes, France, pp. 277–288 (September 1997)

    Google Scholar 

  11. Moyer, M.J., Tech, G., Rao, J.R., Rohatgi, P.: Maintaining Balanced Key Trees for Secure Multicast, Internet draft (June 1999), http://www.securemulticast.org/draft-irtf-smug-key-tree-balance-00.txt

  12. Moharrum, M., Mukkamala, R., Eltoweissy, M.: Efficient Secure Multicast with Well-Populated Multicast Key Trees. In: Proc. of IEEE ICPADS, p. 214 (July 2004)

    Google Scholar 

  13. Rodeh, O., Birman, K.P., Dolev, D.: Using AVL Trees for Fault Tolerant Group Key Management, Tech. Rep. 2000-1823, Cornell University (2000)

    Google Scholar 

  14. Goshi, J., Ladner, R.E.: Algorithms for Dynamic Multicast Key Distribution Trees. In: Proc. of ACM Symp. on Principles of Distributed Computing, pp. 243–251 (2003)

    Google Scholar 

  15. Almeroth, K.C., Ammar, M.H.: Collecting and Modeling the join/leave Behavior of Multicast Group Members in the MBone. In: Proc. of HPDC, pp. 209–216 (1996)

    Google Scholar 

  16. NIST (National Institute of Standards and Technology), Advanced Encryption Standard (AES), Federal Information Processing Standard 197 (November 2001)

    Google Scholar 

  17. http://www.cryptopp.com/

  18. Shoufan, A., Laue, R., Huss, S.A.: High-Flexibility Rekeying Processor for Key Management in Secure Multicast. In: IEEE Int. Symposium on Embedded Computing SEC 2007, Niagara Falls, Canada (May 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shoufan, A., Arul, T. (2010). Multicast Rekeying: Performance Evaluation. In: Biedermann, A., Molter, H.G. (eds) Design Methodologies for Secure Embedded Systems. Lecture Notes in Electrical Engineering, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16767-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16767-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16766-9

  • Online ISBN: 978-3-642-16767-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics