scispace - formally typeset
Open AccessProceedings ArticleDOI

Kronos: a scalable group re-keying approach for secure multicast

Reads0
Chats0
TLDR
Kronos can be used in conjunction with distributed key management frameworks such as IGKMP (T. Hardjono et al., 1998) that use a single group-wide session key for encrypting communications between members of the group.
Abstract: 
The authors describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency of rekeying becomes the primary bottle neck for scalable group re-keying. In contrast, Kronos can scale to handle large and dynamic groups because the frequency of re-keying is independent of the size and membership dynamics of the group. Next, we describe how Kronos can be used in conjunction with distributed key management frameworks such as IGKMP (T. Hardjono et al., 1998) that use a single group-wide session key for encrypting communications between members of the group. Using a detailed simulation, we compare the performance tradeoffs between Kronos and other key management protocols.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A survey of key management for secure group communication

TL;DR: The area of group key management is surveyed, proposed solutions are classified according to those characteristics, and an insight given to their features and goals.
Proceedings ArticleDOI

ELK, a new protocol for efficient large-group key distribution

TL;DR: ELK, a novel key distribution protocol, is designed and implemented to address security challenges of secure media broadcast over the Internet with perfectly reliable, super-efficient member joins and smaller key update messages than previous protocols.
Proceedings ArticleDOI

Secure pebblenets

TL;DR: This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering and an effective probabilistic selection of the key-generating node, which meets the requirements of efficiency, scalability and security needed for the survivability of networks of pebble (pebblenets).
Proceedings ArticleDOI

Self-healing key distribution with revocation

TL;DR: This work addresses the problem of establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network with a self-healing approach, meaning that a group member who has been off-line for some time is able to recover new session keys immediately after coming back on-line.
Journal ArticleDOI

Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks

TL;DR: A novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem that enhances network security and survivability against node capture and employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes.
References
More filters
Journal ArticleDOI

Wide area traffic: the failure of Poisson modeling

TL;DR: It is found that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson processes with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson.

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI

Probability and Statistics with Reliability, Queuing, and Computer Science Applications.

TL;DR: Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition, offers a comprehensive introduction to probabiliby, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics.
Book

Probability and Statistics With Reliability, Queuing and Computer Science Applications

TL;DR: Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition as discussed by the authors is a comprehensive introduction to probabiliby, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics.
Related Papers (5)