2010 Second International Conference on Information Technology and Computer Science 2010
DOI: 10.1109/itcs.2010.82
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: With the development of the Internet,Multicast applications are deployed for mainstream use,IP multicasting is critical technology in those applications.The absence of security mechanism has limited the use of multicast.In order to protect communication confidentiality,Traffic in secure multicast is encrypted with a Session Encryption Key which is only to the certificated group members.Key management become essential issue for IP multicast.The aim of key management for multicast is for group members in one mul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 3 publications
(2 reference statements)
0
9
0
Order By: Relevance
“…Jiang et al [29] and others [10], [16], [17], [25], [27] mention similar metrics for comparison, namely computation costs, storage requirements, communication cost of the rekeying process, and the frequency of key updates. However, similar to Li et al [31], most of these surveys do not present a systematic and comprehensive evaluation of GKM schemes regarding the different relevant factors as provided in our survey. Mapoka et al [17] also name key independence as another security requirement.…”
Section: Related Workmentioning
confidence: 85%
See 2 more Smart Citations
“…Jiang et al [29] and others [10], [16], [17], [25], [27] mention similar metrics for comparison, namely computation costs, storage requirements, communication cost of the rekeying process, and the frequency of key updates. However, similar to Li et al [31], most of these surveys do not present a systematic and comprehensive evaluation of GKM schemes regarding the different relevant factors as provided in our survey. Mapoka et al [17] also name key independence as another security requirement.…”
Section: Related Workmentioning
confidence: 85%
“…As defined in Section II-A, Secure Group Communication scheme (SGC) schemes consist of two main components: group key management and group membership management. Several surveys cover the former, which is the core component of SGC schemes [2], [16], [17], [25]- [31]. As for the latter, it has not received the same amount of attention.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Markov chain trust model was proposed to determine the trust value for each one‐hop neighbors. Various key management protocols have been proposed for dynamic multicast environment where nodes may join and leave to provide confidentiality and integrity []. However, all of these approaches are not directly applicable to the problem we are addressing in this paper (Figure ).…”
Section: Related Workmentioning
confidence: 99%
“…A survey on key management for multicast is given in (Li and Wu, 2010) which analyzes the problems in key management for multicast and reviews some typical schemes like Simple Key Distribution Center (SKDC), Group Key Management Protocol (GKMP), Scalable Multicast Key Distribution (SMKD), Iolus and Logical Key Hierarchy (LKH).…”
Section: Jcsmentioning
confidence: 99%