Kronos: a scalable group re-keying approach for secure multicast
Sanjeev Setia,S. Koussih,Sushil Jajodia,E. Harder +3 more
- pp 215-228
Reads0
Chats0
TLDR
Kronos can be used in conjunction with distributed key management frameworks such as IGKMP (T. Hardjono et al., 1998) that use a single group-wide session key for encrypting communications between members of the group.Abstract:Â
The authors describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keying. We first motivate our approach by showing that if a group is re-keyed on each membership change, as the size of the group increases and/or the rate at which members leave and join the group increases, the frequency of rekeying becomes the primary bottle neck for scalable group re-keying. In contrast, Kronos can scale to handle large and dynamic groups because the frequency of re-keying is independent of the size and membership dynamics of the group. Next, we describe how Kronos can be used in conjunction with distributed key management frameworks such as IGKMP (T. Hardjono et al., 1998) that use a single group-wide session key for encrypting communications between members of the group. Using a detailed simulation, we compare the performance tradeoffs between Kronos and other key management protocols.read more
Citations
More filters
Journal ArticleDOI
A survey of key management for secure group communication
S. Rafaeli,David Hutchison +1 more
TL;DR: The area of group key management is surveyed, proposed solutions are classified according to those characteristics, and an insight given to their features and goals.
Proceedings ArticleDOI
ELK, a new protocol for efficient large-group key distribution
A. Penrig,Dawn Song,D. Tygar +2 more
TL;DR: ELK, a novel key distribution protocol, is designed and implemented to address security challenges of secure media broadcast over the Internet with perfectly reliable, super-efficient member joins and smaller key update messages than previous protocols.
Proceedings ArticleDOI
Secure pebblenets
TL;DR: This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering and an effective probabilistic selection of the key-generating node, which meets the requirements of efficiency, scalability and security needed for the survivability of networks of pebble (pebblenets).
Proceedings ArticleDOI
Self-healing key distribution with revocation
TL;DR: This work addresses the problem of establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network with a self-healing approach, meaning that a group member who has been off-line for some time is able to recover new session keys immediately after coming back on-line.
Journal ArticleDOI
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
TL;DR: A novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem that enhances network security and survivability against node capture and employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes.
References
More filters
Journal ArticleDOI
Wide area traffic: the failure of Poisson modeling
Vern Paxson,Sally Floyd +1 more
TL;DR: It is found that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson processes with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson.
Security Architecture for the Internet Protocol
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI
Probability and Statistics with Reliability, Queuing, and Computer Science Applications.
Robert Geist,Kishor S. Trivedi +1 more
TL;DR: Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition, offers a comprehensive introduction to probabiliby, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics.
Book
Probability and Statistics With Reliability, Queuing and Computer Science Applications
TL;DR: Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition as discussed by the authors is a comprehensive introduction to probabiliby, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics.