Abstract
Providing effective security with minimum communication cost in the distribution of keying material in a secure multicast communication is a challenging issue, since the amount of information sent through the wired or wireless channel is high. Moreover, the key must be sent securely to the group members. In this paper, we propose a new Key Distribution Protocol that reduces the time delay taken to distribute the keying information to receiver side. To minimize the amount of bits communicated we propose secure one way hash function in the key distribution protocol in which Euler’s Totient Function ϕ(n) is used in the key computation process. It decrease the time delay to reach the destination by reducing the number of bits communicated while distributing the Keying and re-keying information. Two major operations in this scheme are joining and leaving operations for managing multicast group memberships. The main advantage of this approach is that it uses an existing binary tree based key management scheme to manage the keys that are generated by the GC. The performance of this approach is compared with the existing approaches in this paper and it is shown that this proposed approach takes less communication delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li, M., Poovendran, R., McGrew, D.A.: Minimizing Center Key Storage in Hybrid One-Way Function based Group Key Management with Communication Constraints. Information Processing Letters, 191–198 (2004)
Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups. In: Proceedings of the IEEE International Conference on Network Protocols, p. 322 (2002)
Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Distribution for Secure Multimedia Multicasts via Data Embedding. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 1449–1452 (2001)
Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Distribution for Secure Multimedia Multicasts via Data Embedding. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 3, pp. 1449–1452 (2001)
Trappe, W., Song, J., Poovendran, R., Ray Liu, K.J.: Key Management and Distribution for Secure Multimedia Multicast. IEEE Transactions on Multimedia 5(4), 544–557 (2003)
Blaum, M., Bruck, J., Vardy, A.: MDS Array Codes with Independent Parity Symbols. IEEE Transactions on Information Theory 42(2), 529–542 (1996)
Xu, L., Huang, C.: Computation-Efficient Multicast Key Distribution. IEEE Transactions on Parallel and Distributed Systems 19(5), 1–10 (2008)
McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups using One-Way Function Trees: Cryptographic Technologies Group, TIS Labs at Network Associates (1998)
Apostol, T.M.: Introduction to Analytic Number Theory. Springer International Students edn., vol. 1, pp. 25–28 (1998)
Vijayakumar, P., Bose, S., Kannan, A., Siva Subramanian, S.: A Secure Key Distribution Protocol for Multicast Communication. In: Balasubramaniam, P. (ed.) Gandhigram-India 2011. LNCS, vol. 140, pp. 249–257. Springer, Heidelberg (2011)
Wong, C., Gouda, M., Lam, S.: Secure Group Communications using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)
Zhou, Y., Zhu, X., Fang, Y.: MABS: Multicast Authentication Based on Batch Signature. IEEE Transactions on Mobile Computing 9, 982–993 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vijayakumar, P., Bose, S., Kannan, A., Himesh, P.H. (2011). Key Distribution Protocol for Secure Multicast with Reduced Communication Delay. In: Zhong, N., Callaghan, V., Ghorbani, A.A., Hu, B. (eds) Active Media Technology. AMT 2011. Lecture Notes in Computer Science, vol 6890. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23620-4_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-23620-4_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23619-8
Online ISBN: 978-3-642-23620-4
eBook Packages: Computer ScienceComputer Science (R0)