Proceedings DARPA Information Survivability Conference and Exposition
DOI: 10.1109/discex.2003.1194909
|View full text |Cite
|
Sign up to set email alerts
|

Key management for secure multicast group communication in mobile networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…Due to the reason that the movement between two subgroups in the centralized protocols give rise to two subgroup re-keying and the global key update, which is much bigger than our protocol in PKI. In such regular case, our protocol just gets 25% and 55% of the real re-key messages and the re-key events compared to centralized protocols without PKI in average respectively [8,15,16] .…”
Section: Simulation Studiesmentioning
confidence: 96%
See 1 more Smart Citation
“…Due to the reason that the movement between two subgroups in the centralized protocols give rise to two subgroup re-keying and the global key update, which is much bigger than our protocol in PKI. In such regular case, our protocol just gets 25% and 55% of the real re-key messages and the re-key events compared to centralized protocols without PKI in average respectively [8,15,16] .…”
Section: Simulation Studiesmentioning
confidence: 96%
“…Similar to a join event, the re-keying process only happens within the subgroup by multicasting the new K S,i to the remaining group members encrypted by members' individual keys. While in centralized key management schemes without PKI [8,15,16] , the group manager still needs to update the global group key and subgroup key database and Let P denotes the data packets; ) (P K + means using K to encrypt P ; and ) (P K − means using K to decrypt P .…”
Section: Leave Eventmentioning
confidence: 99%
“…Because the PK(SGKS i ) of SGKS i is not altering as the change of K S,i , and the K S,i is only generated by SGKS i , it's apparent that other subgroups needn't to carry out the re-key operations. All the rekey operations are accomplished by the SGKS within the subgroup, and the whole overhead is only concerned within the changing subgroup, which is apparently reduced compared to the centralized protocols without PKI [8,15,16] .…”
Section: Join Eventmentioning
confidence: 99%
“…Various extensions were proposed to deal with reliability [15], node dependent group dynamic [16], and time variant group dynamic [4,11]. Extensions to wireless networks were first discussed in [17] and several secure multicast protocols were proposed [18][19][20]. These protocols addressed both issues related to mobility and unreliability.…”
Section: Related Workmentioning
confidence: 99%