Topology-Aware Key Management Scheme for Secure Overlay Multicast

Recently, the research focus of multicast has been put on overlay multicast In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security In particular, adding confidentiality to overlay multicast is needed To achieve confidentiality, data encryption keys are shared among the multicast group members There is a need for key distribution scheme to solve the rekeying overhead We introduce the key management solution called KTOM And, we propose the use of periodic batch rekeying in KTOM.

[1]  Hui Zhang,et al.  Internet Multicast Video Delivery , 2005, Proceedings of the IEEE.

[2]  Shueng-Han Gary Chan,et al.  SOT: secure overlay tree for application layer multicast , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[3]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[4]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[5]  Shueng-Han Gary Chan,et al.  Key management approaches to offer data confidentiality for secure multicast , 2003 .

[6]  Lixia Zhang,et al.  Host multicast: a framework for delivering multicast to end users , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[7]  Vincent Roca,et al.  A survey of proposals for an alternative group communication service , 2003, IEEE Netw..