Skip to main content

Key Distribution Protocol for Secure Multicast with Reduced Communication Delay

  • Conference paper
Book cover Active Media Technology (AMT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6890))

Included in the following conference series:

Abstract

Providing effective security with minimum communication cost in the distribution of keying material in a secure multicast communication is a challenging issue, since the amount of information sent through the wired or wireless channel is high. Moreover, the key must be sent securely to the group members. In this paper, we propose a new Key Distribution Protocol that reduces the time delay taken to distribute the keying information to receiver side. To minimize the amount of bits communicated we propose secure one way hash function in the key distribution protocol in which Euler’s Totient Function ϕ(n) is used in the key computation process. It decrease the time delay to reach the destination by reducing the number of bits communicated while distributing the Keying and re-keying information. Two major operations in this scheme are joining and leaving operations for managing multicast group memberships. The main advantage of this approach is that it uses an existing binary tree based key management scheme to manage the keys that are generated by the GC. The performance of this approach is compared with the existing approaches in this paper and it is shown that this proposed approach takes less communication delay.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, M., Poovendran, R., McGrew, D.A.: Minimizing Center Key Storage in Hybrid One-Way Function based Group Key Management with Communication Constraints. Information Processing Letters, 191–198 (2004)

    Google Scholar 

  2. Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups. In: Proceedings of the IEEE International Conference on Network Protocols, p. 322 (2002)

    Google Scholar 

  3. Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Distribution for Secure Multimedia Multicasts via Data Embedding. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 1449–1452 (2001)

    Google Scholar 

  4. Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Distribution for Secure Multimedia Multicasts via Data Embedding. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 1449–1452 (2001)

    Google Scholar 

  5. Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Management and Distribution for Secure Multimedia Multicast. IEEE Transactions on Multimedia 5(4), 544–557 (2003)

    Article  Google Scholar 

  6. Blaum, M., Bruck, J., Vardy, A.: MDS Array Codes with Independent Parity Symbols. IEEE Transactions on Information Theory 42(2), 529–542 (1996)

    Article  MATH  Google Scholar 

  7. Xu, L., Huang, C.: Computation-Efficient Multicast Key Distribution. IEEE Transactions on Parallel and Distributed Systems 19(5), 1–10 (2008)

    Article  Google Scholar 

  8. McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups using One-Way Function Trees: Cryptographic Technologies Group, TIS Labs at Network Associates (1998)

    Google Scholar 

  9. Apostol, T.M.: Introduction to Analytic Number Theory. Springer International Students edn., vol. 1, pp. 25–28 (1998)

    Google Scholar 

  10. Vijayakumar, P., Bose, S., Kannan, A., Siva Subramanian, S.: A Secure Key Distribution Protocol for Multicast Communication. In: Balasubramaniam, P. (ed.) Gandhigram-India 2011. LNCS, vol. 140, pp. 249–257. Springer, Heidelberg (2011)

    Google Scholar 

  11. Wong, C., Gouda, M., Lam, S.: Secure Group Communications using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  12. Zhou, Y., Zhu, X., Fang, Y.: MABS: Multicast Authentication Based on Batch Signature. IEEE Transactions on Mobile Computing 9, 982–993 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vijayakumar, P., Bose, S., Kannan, A., Himesh, P.H. (2011). Key Distribution Protocol for Secure Multicast with Reduced Communication Delay. In: Zhong, N., Callaghan, V., Ghorbani, A.A., Hu, B. (eds) Active Media Technology. AMT 2011. Lecture Notes in Computer Science, vol 6890. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23620-4_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23620-4_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23619-8

  • Online ISBN: 978-3-642-23620-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics