Security Improvement in Group Key Management

Multicast is a one to the group communication which have various challenges such as group key management, multicast receiver access control, multicast finger printing and multicast source authentication. Various protocols introduced by many researchers to minimize the lacks such as computational, communication, message size and storage overheads for group key management, but these proposed methods still have some lack as discussed above, while rekeying cost is also not less. Therefore to provide a solution of existing problem after leaving a group, there is a need for efficient and improved mechanism for group key management.

[1]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[2]  Clemens Heinrich,et al.  Transport Layer Security (TLS) , 2011, Encyclopedia of Cryptography and Security.

[3]  Haitham S. Cruickshank,et al.  Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.

[4]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[5]  David K. Y. Yau,et al.  Distributed collaborative key agreement and authentication protocols for dynamic peer groups , 2006, TNET.

[6]  Xiaoyan Chen,et al.  M-CLIQUES: modified CLIQUES key agreement for secure multicast , 2005, Canadian Conference on Electrical and Computer Engineering, 2005..

[7]  Haibin Lu,et al.  A novel high-order tree for secure multicast key management , 2005, IEEE Transactions on Computers.

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  T. Purusothaman,et al.  An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks , 2010 .

[10]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[11]  Salwa H. El-Ramly,et al.  New real time multicast authentication protocol , 2008, 2008 International Conference on Computer Engineering & Systems.

[12]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[13]  Said Fathy El-Zoghdy,et al.  A Scalable and Distributed Security Protocol for Multicast Communications , 2011, Int. J. Netw. Secur..

[14]  Jim Alves-Foss,et al.  A communication-computation efficient group key algorithm for large and dynamic groups , 2007, Comput. Networks.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  K. J. Ray Liu,et al.  Hierarchical group access control for secure multicast communications , 2007, TNET.

[17]  Ran Canetti,et al.  Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.

[18]  Toshihiko Kato,et al.  A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation , 2007, Comput. Networks.

[19]  Seung-Woo Seo,et al.  Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..

[20]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[21]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[22]  V. Vaidehi,et al.  Secure Group Key Management Scheme for Multicast Networks , 2010, Int. J. Netw. Secur..