Skip to main content

Optimizing Multicast Key Management for Cellular Multicasting

  • Chapter
Network-Aware Security for Group Communications
  • 236 Accesses

There has been significant advancements in building a global wireless infrastructure that will free users from the confines of static communication networks. Users will be able to access the Internet from anywhere at anytime. As wireless connections become ubiquitous, consumers will desire to have multicast applications running on their mobile devices. In order to meet such a demand, there has been increasing research efforts in the area of wireless multicast [75-77].

In wireless networks, where bandwidth is limited and transmission error rate is high, the design of key management schemes need to consider the transmission of the rekeying messages. When the design of key management schemes can take advantage of the broadcast nature of wireless media as well as the wireless network topology, the communication overhead introduced by key management can be reduced. As a direct consequence, the reliability of key distribution can be greatly improved.

In this chapter, some important properties of tree-based centralized key management scheme will be exploited. Based on these properties, the concept of topology-aware key management will be introduced. A specific design of such topology-aware key management scheme is then presented in detail, followed by performance evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2008). Optimizing Multicast Key Management for Cellular Multicasting. In: Network-Aware Security for Group Communications. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68848-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68848-0_5

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-68846-6

  • Online ISBN: 978-0-387-68848-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics