Skip to main content

Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast

  • Conference paper
Computational Intelligence in Security for Information Systems

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6694))

  • 1485 Accesses

Abstract

The secure multicast field has been extensively studied for more than a decade now and there exist numerous proposals throughout academic literature. This paper presents a selection of those most important and popular to the date, focusing on centralized schemes due to their high popularity and the recent publication of alternatives that do not appear in previous revisions. Comparisons are provided and special attention is paid to communications and storage overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cisco IOS Secure Multicast, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/prod_white_paper0900aecd8047191e.html

  2. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)

    Article  Google Scholar 

  3. Chan, K.-C., Chan, S.-H.G.: Key management approaches to offer data confidentiality for secure multicast. IEEE Network 17(5), 30–39 (2003)

    Article  Google Scholar 

  4. Zhu, S., Jajodia, S.: Scalable group key management for secure multicast: A taxonomy and new directions. In: Huang, H., MacCallum, D., Du, D.-Z. (eds.) Network Security, pp. 57–75. Springer, US (2010)

    Chapter  Google Scholar 

  5. Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification. RFC 2093 (1997)

    Google Scholar 

  6. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. RFC 2627 (1999)

    Google Scholar 

  7. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  8. Chan, K.-C., Chan, S.-H.G.: Distributed servers approach for large-scale secure multicast. IEEE JSAC 20(8) (October 2002)

    Google Scholar 

  9. Chan, K.-C., Chan, S.-H.G.: Distributed servers networks for secure multicast. In: Proc. IEEE Globecom 2001, San Antonio, TX, pp. 25–29 (2001)

    Google Scholar 

  10. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  11. Di Pietro, R., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp. 66–73 (2002)

    Google Scholar 

  12. Lin, J.-C., Huang, K.-H., Lai, F., Lee, H.-C.: Secure and efficient group key management with shared key derivation. Comput. Stand. Inter. 31(1), 192–208 (2009)

    Article  Google Scholar 

  13. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software 29, 444–458 (2003)

    Article  Google Scholar 

  14. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of INFOCOM 1999, pp. 708–716. IEEE, Los Alamitos (1999)

    Google Scholar 

  15. Perrig, A., Song, D., Tygar, J.D.: Elk, a new protocol for efficient large-group key distribution. Proceedings of IEEE S&P, 247–262 (2001)

    Google Scholar 

  16. Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications E85-B(5), 1050–1051 (2002)

    Google Scholar 

  17. Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings 2003 International Conference on Parallel Processing Workshops, pp. 391–396 (October 2003)

    Google Scholar 

  18. Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of INFOCOM 1999, pp. 689–698. IEEE, Los Alamitos (1999)

    Google Scholar 

  19. Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2824–2834 (2001)

    Google Scholar 

  20. Zhou, Z., Huang, D.: An optimal key distribution scheme for secure multicast group communication. In: INFOCOM 2010, pp. 331–335 (2010)

    Google Scholar 

  21. Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption, pp. 459–474. Springer, Heidelberg (1999)

    MATH  Google Scholar 

  22. Chiou, G.-h., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Trans. Softw. Eng. 15(8), 929–934 (1989)

    Article  Google Scholar 

  23. Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to privacy and secure communications. In: Proceedings of CMMSE (2010)

    Google Scholar 

  24. Scheikl, O., Lane, J., Boyer, R., Eltoweissy, M.: Multi-level secure multicast: the rethinking of secure locks. In: Proceedings International Conference on Parallel Processing Workshops, pp. 17–24 (2002)

    Google Scholar 

  25. Pais, A.R., Joshi, S.: A new probabilistic rekeying method for secure multicast groups. Int. J. Inf. Secur. 9, 275–286 (2010)

    Article  Google Scholar 

  26. Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group communications. In: INFOCOM 2004, vol. 2, pp. 1296–1306 (2004)

    Google Scholar 

  27. Sun, Y., Liu, K.J.R.: Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Netw. 15, 1514–1526 (2007)

    Article  Google Scholar 

  28. Zhang, Q., Wang, Y., Jue, J.P.: A key management scheme for hierarchical access control in group communication. International Journal of Network Security 7(3), 323–334 (2008)

    Google Scholar 

  29. Zhang, J., Varadharajan, V., Mu, Y.: A scalable multi-service group key management scheme. In: Proceedings of AICT-ICIW 2006, pp. 172–177 (2006)

    Google Scholar 

  30. Yan, J., Ma, J., Liu, H.: Key hierarchies for hierarchical access control in secure group communications. Computer Networks 53(3), 353–364 (2009)

    Article  MATH  Google Scholar 

  31. Hur, J., Yoon, H.: A multi-service group key management scheme for stateless receivers in wireless mesh networks. Mob. Netw. Appl. 15, 680–692 (2010)

    Article  Google Scholar 

  32. Zhu, S., Setia, S., Jajodia, S.: Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds.) NGC 2003 and ICQT 2003. LNCS, vol. 2816, pp. 107–118. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  33. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)

    Google Scholar 

  34. Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM conference on Computer and Communications Security, CCS 2003, pp. 231–240 (2003)

    Google Scholar 

  35. Dutta, R., Dong, Y., Mukhopadhyay, W.S.: Constant storage self-healing key distribution with revocation in wireless sensor network (2007)

    Google Scholar 

  36. Du, W., He, M.: Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345–359. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  37. Du, W., He, M., Li, X.: A new constant storage self-healing key distribution with revocation in wireless sensor networks. In: Hua, A., Chang, S.-L. (eds.) ICA3PP 2009. LNCS, vol. 5574, pp. 832–843. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naranjo, J.A.M., Casado, L.G. (2011). Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21323-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21322-9

  • Online ISBN: 978-3-642-21323-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics