Advertisement

Topology-Aware Key Management Scheme for Secure Overlay Multicast

  • Jong-Hyuk Roh
  • Seunghun Jin
  • Kyoon-Ha Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3961)

Abstract

Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM. And, we propose the use of periodic batch rekeying in KTOM.

Keywords

Multicast Tree Cluster Leader Multicast Data Periodic Batch Secure Group Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–29 (2000)CrossRefGoogle Scholar
  2. 2.
    Yiu, W.-P.K., Chan, S.-H.G.: SOT: Secure Overlay Tree for Application Layer Multicast. In: IEEE International Conference on Communications, vol. 3 (June 2004)Google Scholar
  3. 3.
    Ganjam, A., Zhang, H.: Internet multicast video delivery. Proceedings of the IEEE 93, 159–170 (2005)CrossRefGoogle Scholar
  4. 4.
    El-Sayed, A., Roca, V., Mathy, L.: A Survey of Proposals for an Alternative Group Communication Service. IEEE Network 17, 46–51 (2003)CrossRefGoogle Scholar
  5. 5.
    Chan, K., Chan, S.H.G.: Key Management Approaches to Offer Data Confidentiality for Secure Multicast. IEEE Network 17, 30–39 (2003)CrossRefGoogle Scholar
  6. 6.
    Francis, P.: Yoid: Extending the Internet Multicast Architecture, Technical Report, ACIRI (April 2000)Google Scholar
  7. 7.
    Zhang, B., Jamin, S., Zhang, L.: Host Multicast: A Framework for Delivering Multicast to End Users. INFOCOM 3, 1366–1375 (2003)Google Scholar
  8. 8.
    Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch Rekeying for Secure Group Communications. In: Proceedings of the tenth international World Wide Web conference on World Wide Web (May 2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jong-Hyuk Roh
    • 1
  • Seunghun Jin
    • 1
  • Kyoon-Ha Lee
    • 2
  1. 1.Information Security Research DivisionETRIKorea
  2. 2.Dept. of Computer Science and EngineeringInha UniversityKorea

Personalised recommendations