Skip to main content

GKDA: A Group-Based Key Distribution Algorithm for WiMAX MBS Security

  • Conference paper
Advances in Multimedia Information Processing - PCM 2006 (PCM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4261))

Included in the following conference series:

Abstract

Multicast and Broadcast Service (MBS) is a novel application supported by the currently released IEEE 802.16e. This service can increase the efficiency of WiMAX networks. The key management and distribution is crucial to evolve MBS efficiently and safely. In this paper, we present a group-based key distribution algorithm GKDA to provide a more scalable solution to reduce the key updating overhead, therefore a base station (BS) can support and maintain more MBS users. Theoretical analyses and simulation results have proven the performance and advantage of our algorithm. In addition, GKDA can strengthen the network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosh, A., Wolter, D.R., Andrews, J.G., Chen, R.: Broadband Wireless Access with WiMax/802. 16: Current Performance Benchmarks and Future Potential. Communications Magazine 43(2), 129–136 (2005)

    Google Scholar 

  2. Santhi, K.R., Kumaran, G.S.: Migration to 4 G: Mobile IP based Solutions. In: Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW 2006), pp. 76–81 (2006)

    Google Scholar 

  3. 3rd Generation Partnership Project: Multimedia broadcast/multicast service; release 6. Tech. Rep. TS 22.146 v6.1.0 (2002)

    Google Scholar 

  4. IEEE Computer Society and the IEEE Microwave Theory and Techniques Society: Local and metropolitan area networks - Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems; Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1 (2006)

    Google Scholar 

  5. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–31 (2000)

    Article  Google Scholar 

  6. Xu, W.Y., Trappe, W., Paul, S.: Key Management for 3G MBMS Security. In: IEEE Global Telecommunications Conference / GLOBECOM, vol. 4, pp. 2270–2276 (2004)

    Google Scholar 

  7. Sarac, K., Almeroth, K.C.: Monitoring IP Multicast in the Internet: Recent Advances and Ongoing Challenges. IEEE Communications Magazine 43(10), 85–91 (2005)

    Article  Google Scholar 

  8. Almeroth, K., Ammar, M.: Collecting and Modeling of the Join/Leave Behavior of Multicast Group Members in the Mbone. In: High Performance Distributed Computing Focus Workshop (HPDC), pp. 209–216 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, H., Fan, G., Qiu, J., Lin, X. (2006). GKDA: A Group-Based Key Distribution Algorithm for WiMAX MBS Security. In: Zhuang, Y., Yang, SQ., Rui, Y., He, Q. (eds) Advances in Multimedia Information Processing - PCM 2006. PCM 2006. Lecture Notes in Computer Science, vol 4261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922162_37

Download citation

  • DOI: https://doi.org/10.1007/11922162_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48766-1

  • Online ISBN: 978-3-540-48769-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics