An efficient key management scheme for secure wireless multicast

In the future, many multicast services will take place in the wireless domain. However, before these services can successfully be deployed, security infrastructures must be developed that manage the keys needed to provide access control to content. We present a method for designing multicast key management trees that are suitable for mobile wireless environments. By matching the key management tree to the cellular network topology, the total communication burden is reduced by 33%-45% compared to using the traditional key management trees that are independent of the topology.

[1]  Suresh Singh,et al.  RelM: reliable multicast for mobile networks , 1998, Comput. Commun..

[2]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[3]  K. J. Ray Liu,et al.  Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[4]  Prem Dassanayake,et al.  User Mobility Modeling and Characterization of Mobility Patterns , 1997, IEEE J. Sel. Areas Commun..

[5]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[6]  Stephen S. Rappaport,et al.  Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures , 1986, IEEE Transactions on Vehicular Technology.

[7]  Fambirai Takawira,et al.  Nonclassical traffic modeling and performance analysis of cellular mobile networks with and without channel reservation , 2000, IEEE Trans. Veh. Technol..

[8]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[9]  Stephen S. Rappaport,et al.  Traffic Model and Performance Analysis for Cellular Mobile Radio Telephone Systems with Prioritized and Nonprioritized Handoff Procedures - Version 2a , 2000 .