Dynamic Architecture and Performance Analysis of Secure and Efficient Key Management Scheme in Multicast Network

  • N. M. Saravanakumar
  • R. Keerthana
  • G. M. Mythili
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


Group key management in multicast networks plays a crucial role in data communication environment. Also, key management deals with distribution of keys among group members and maintaining the keys. The lack of security services, communication overhead, computation overhead, etc. Enables us to concentrate on creating new innovative ideas. A key distribution algorithm in the reviewed protocols does not provide much security in group communication networks. The contribution of this research is to investigate all the available key management schemes and to design the secure and efficient key management scheme in multicast network for achieving a secure communication between the group members. The proposed scheme, dynamic architecture and performance analysis of secure and efficient key management scheme, provides a secure variable UID-based key management scheme which protects non-group members from the access of data and generation of static group key which reduces computation cost at any change in the multicast network. The periodic renewal of group key using proactive secret sharing scheme provides greater security during communication. The proposed authentication process ensures data integrity and confidentiality during communication and the encryption mechanism used in dynamic architecture and performance analysis of secure and efficient key management scheme completely eliminates the communication, computation overhead, and network traffics. The analysis shows that the proposed key management scheme comprises of the most reliable methods for key generations and key distributions and provides better performance in terms of security requirements and other services.


Multicast network Key management Rekeying Invertible matrix 


  1. 1.
    J. Bibo, H. Xiulin, A survey of group key management, in International Conference on Computer Science and Software Engineering (2008)Google Scholar
  2. 2.
    A.T. Sherman, D.A. McGrew, Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software Eng. 29(5), 444–458 (2003)CrossRefGoogle Scholar
  3. 3.
    L. Dondeti, S. Mukherjee, A. Samal, Scalable secure one-to-many group communication using dual encryption. Comput. Commun. ACM 23, 1681–1701 (1999)CrossRefGoogle Scholar
  4. 4.
    E. Munivel, J. Lokesh, Design of secure group key management scheme for multicast networks using number theory, in CIMCA, IAWTIC, and ISE (2008)Google Scholar
  5. 5.
    C. Isabella, E. Robert, in Proceedings of IEEE INFOCOM’99 Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques. 18th Annual Joint Conference of the IEEE Computer and Communications Societies (1999)Google Scholar
  6. 6.
    J. Lakshmanaperumal, K. Thanushkodi, N.M. Saravana Kumar, K. Saravanan, T. Purusothaman, Efficient key management scheme for secure multicast in MANET. IJCSNS Int. J. Comput. Sci. Netw. Secur. 10(11) (2010)Google Scholar
  7. 7.
    W. Liming, W. Chuan, Efficient key agreement for large and dynamic multicast groups. Int. J. Netw. Secur. 3(1), 8–17 (2006)Google Scholar
  8. 8.
    S. Vijaya, B.H. Ravi Krishna, A group key management approach for multicast cryptosystems. J. Theor. Appl. Infor. Technol. (2009)Google Scholar
  9. 9.
    M.M. Nasreldin Rasslan, Y.H. Dakroury, H.K. Aslan, A new secure multicast key distribution protocol using combinatorial boolean approach. Int. J. Netw. Secur. 8(1), 75–89 (2009)Google Scholar
  10. 10.
    M.S. Bouassida, I. Chrisment, O. Festor, Group key management in MANETs. Int. J. Netw. Secur. 6(1), 67–79 (2008)Google Scholar
  11. 11.
    L. Pavithira, T. Purushothaman, An energy efficient topology aware key management scheme for multicasting in ad-hoc networks. Int. J. Wisdom Based Comput. 1(3) (2011)Google Scholar
  12. 12.
    S. Pitipatana, A. Nirwan, Elliptic curve cryptosystem-based group key management for secure group communications, in IEEE Military Communications Conference (2007)Google Scholar
  13. 13.
    R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, Secure group key management scheme for multicast networks. Int. J. Netw. Secur. 11(1), 33–38 (2010)Google Scholar
  14. 14.
    P. Roberto, V. Luigi, M. Mancini, Alessandro. Key management for high bandwidth secure multicast. J. Comput. Secur. 693–709 (2004)Google Scholar
  15. 15.
    J. Jabeen, T. Purusothaman, A new scalable and reliable cost effective key agreement protocol for secure group communication. J. Comput. Sci. 7(3), 328–340 (2011)CrossRefGoogle Scholar
  16. 16.
    D. Luciano, G. Prichett, From caesar ciphers to public-key cryptosystem. Coll. Math. J. 12(1), 2–17 (1987)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • N. M. Saravanakumar
    • 1
  • R. Keerthana
    • 1
  • G. M. Mythili
    • 1
  1. 1.Department of Computer Science and EngineeringBannari Amman Institute of TechnologySathyamangalamIndia

Personalised recommendations