Topology-Aware Key Management Scheme for Secure Overlay Multicast
Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM. And, we propose the use of periodic batch rekeying in KTOM.
KeywordsMulticast Tree Cluster Leader Multicast Data Periodic Batch Secure Group Communication
Unable to display preview. Download preview PDF.
- 2.Yiu, W.-P.K., Chan, S.-H.G.: SOT: Secure Overlay Tree for Application Layer Multicast. In: IEEE International Conference on Communications, vol. 3 (June 2004)Google Scholar
- 6.Francis, P.: Yoid: Extending the Internet Multicast Architecture, Technical Report, ACIRI (April 2000)Google Scholar
- 7.Zhang, B., Jamin, S., Zhang, L.: Host Multicast: A Framework for Delivering Multicast to End Users. INFOCOM 3, 1366–1375 (2003)Google Scholar
- 8.Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch Rekeying for Secure Group Communications. In: Proceedings of the tenth international World Wide Web conference on World Wide Web (May 2001)Google Scholar