1997
DOI: 10.1145/263109.263179
|View full text |Cite
|
Sign up to set email alerts
|

Iolus

Abstract: As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing multicast (or group) communications is fundamentally different from securing unicast (or paired) communications. In turn, these differences can result in scalability problems for many typical applications.In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2003
2003
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 190 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…However, this approach requires several decryption and re-encryption operations of multicast message, when it passes from a sub-group to another. ILOUS [4], AKMP [9], and BLADE [5] belong to this group.…”
Section: Related Workmentioning
confidence: 96%
See 2 more Smart Citations
“…However, this approach requires several decryption and re-encryption operations of multicast message, when it passes from a sub-group to another. ILOUS [4], AKMP [9], and BLADE [5] belong to this group.…”
Section: Related Workmentioning
confidence: 96%
“…In ad-hoc network, very frequent rekeying operation will eventually cause a broadcast storm. The second category of research focuses on reducing the frequency of re-keying [2,4]. Especially, Kronos and Iolus adopt a time-driven method, which performs the rekeying operation periodically instead of performing it whenever member changes occur [2,4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Choi et al (2009) present a solution to the problem of broadcast communications, to be used in the event of, for example broadcasting alarm states. Lee et al (2008) integrate Choi et al (2009) with the Iolus framework (Mittra 1997) to break down key distribution into hierarchies to ensure efficient distribution of new keys and revocation of expired keys, whilst still supporting broadcast messages.…”
Section: Encryptionmentioning
confidence: 99%
“…Third is Group member. IOLUS protocol is the frame work of a hierarchy of multicast subgroups to constitute virtual group [20]. Each subgroup is managed by a Group Security Agent (GSA), responsible for managing key inside the sub group.…”
Section: A) Decentralized Group Key Management Protocolsmentioning
confidence: 99%