Abstract
The secure multicast field has been extensively studied for more than a decade now and there exist numerous proposals throughout academic literature. This paper presents a selection of those most important and popular to the date, focusing on centralized schemes due to their high popularity and the recent publication of alternatives that do not appear in previous revisions. Comparisons are provided and special attention is paid to communications and storage overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cisco IOS Secure Multicast, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/prod_white_paper0900aecd8047191e.html
Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)
Chan, K.-C., Chan, S.-H.G.: Key management approaches to offer data confidentiality for secure multicast. IEEE Network 17(5), 30–39 (2003)
Zhu, S., Jajodia, S.: Scalable group key management for secure multicast: A taxonomy and new directions. In: Huang, H., MacCallum, D., Du, D.-Z. (eds.) Network Security, pp. 57–75. Springer, US (2010)
Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification. RFC 2093 (1997)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. RFC 2627 (1999)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Chan, K.-C., Chan, S.-H.G.: Distributed servers approach for large-scale secure multicast. IEEE JSAC 20(8) (October 2002)
Chan, K.-C., Chan, S.-H.G.: Distributed servers networks for secure multicast. In: Proc. IEEE Globecom 2001, San Antonio, TX, pp. 25–29 (2001)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)
Di Pietro, R., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp. 66–73 (2002)
Lin, J.-C., Huang, K.-H., Lai, F., Lee, H.-C.: Secure and efficient group key management with shared key derivation. Comput. Stand. Inter. 31(1), 192–208 (2009)
Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software 29, 444–458 (2003)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of INFOCOM 1999, pp. 708–716. IEEE, Los Alamitos (1999)
Perrig, A., Song, D., Tygar, J.D.: Elk, a new protocol for efficient large-group key distribution. Proceedings of IEEE S&P, 247–262 (2001)
Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications E85-B(5), 1050–1051 (2002)
Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings 2003 International Conference on Parallel Processing Workshops, pp. 391–396 (October 2003)
Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of INFOCOM 1999, pp. 689–698. IEEE, Los Alamitos (1999)
Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2824–2834 (2001)
Zhou, Z., Huang, D.: An optimal key distribution scheme for secure multicast group communication. In: INFOCOM 2010, pp. 331–335 (2010)
Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption, pp. 459–474. Springer, Heidelberg (1999)
Chiou, G.-h., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Trans. Softw. Eng. 15(8), 929–934 (1989)
Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to privacy and secure communications. In: Proceedings of CMMSE (2010)
Scheikl, O., Lane, J., Boyer, R., Eltoweissy, M.: Multi-level secure multicast: the rethinking of secure locks. In: Proceedings International Conference on Parallel Processing Workshops, pp. 17–24 (2002)
Pais, A.R., Joshi, S.: A new probabilistic rekeying method for secure multicast groups. Int. J. Inf. Secur. 9, 275–286 (2010)
Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group communications. In: INFOCOM 2004, vol. 2, pp. 1296–1306 (2004)
Sun, Y., Liu, K.J.R.: Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Netw. 15, 1514–1526 (2007)
Zhang, Q., Wang, Y., Jue, J.P.: A key management scheme for hierarchical access control in group communication. International Journal of Network Security 7(3), 323–334 (2008)
Zhang, J., Varadharajan, V., Mu, Y.: A scalable multi-service group key management scheme. In: Proceedings of AICT-ICIW 2006, pp. 172–177 (2006)
Yan, J., Ma, J., Liu, H.: Key hierarchies for hierarchical access control in secure group communications. Computer Networks 53(3), 353–364 (2009)
Hur, J., Yoon, H.: A multi-service group key management scheme for stateless receivers in wireless mesh networks. Mob. Netw. Appl. 15, 680–692 (2010)
Zhu, S., Setia, S., Jajodia, S.: Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds.) NGC 2003 and ICQT 2003. LNCS, vol. 2816, pp. 107–118. Springer, Heidelberg (2003)
Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)
Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM conference on Computer and Communications Security, CCS 2003, pp. 231–240 (2003)
Dutta, R., Dong, Y., Mukhopadhyay, W.S.: Constant storage self-healing key distribution with revocation in wireless sensor network (2007)
Du, W., He, M.: Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345–359. Springer, Heidelberg (2008)
Du, W., He, M., Li, X.: A new constant storage self-healing key distribution with revocation in wireless sensor networks. In: Hua, A., Chang, S.-L. (eds.) ICA3PP 2009. LNCS, vol. 5574, pp. 832–843. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naranjo, J.A.M., Casado, L.G. (2011). Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-21323-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21322-9
Online ISBN: 978-3-642-21323-6
eBook Packages: Computer ScienceComputer Science (R0)