HKM: A hybrid key management scheme for secure mobile multicast

被引:0
|
作者
Lin, Lin [1 ]
Li, XueMing [1 ]
Cheng, Yong [2 ]
机构
[1] Chongqing Univ, Sch Comp Sci, Chongqing 400044, Peoples R China
[2] Chongqing Normal Univ, Dept Comp Sci, Chongqing 400047, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For successfully deploying multicast services in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, a hybrid key management (HKM) tree with topology matching (TM) subtrees and topology independent (TI) subtrees has been proposed. In order to reduce the communication burden of rekeying caused by handoffs, the HKM tree adopts different key management schemes to manage high mobility users and low mobility users. Performance analysis and experimental results indicate a great reduction in the communication cost compared to key management trees that are independent of the network topology.
引用
收藏
页码:109 / +
页数:2
相关论文
共 50 条
  • [21] A Reliable and Secure Hybrid Key Management Scheme for WSNs
    Tufail, Ali
    Khan, Adil Mehmood
    Kim, Ki-Hyung
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (04): : 629 - 642
  • [22] Hybrid Key Management Scheme For Secure AMI Communications
    George, Nithin
    Nithin, S.
    Kottayil, Sasi K.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 862 - 869
  • [23] A scalable key distribution scheme for secure multicast
    Li, BH
    Hou, YB
    Zhao, YL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2532 - 2536
  • [24] A novel secure multicast scheme in mobile Internet
    Guo-jun Wang
    Lin Liao
    Jian-nong Cao
    Keith C. C. Chan
    Journal of Central South University of Technology, 2005, 12 : 720 - 725
  • [25] A novel secure multicast scheme in mobile Internet
    Wang, GL
    Liao, L
    Cao, JN
    Chan, KCC
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2005, 12 (06): : 720 - 725
  • [26] Key management for secure overlay multicast
    Roh, JH
    Lee, KH
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 336 - 345
  • [27] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42
  • [28] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764
  • [29] A dynamic core-based tree scheme for key management in secure multicast
    Xu, ZQ
    Chen, L
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 805 - 812
  • [30] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Victor R. L. Shen
    Wei-Chieh Huang
    Wireless Personal Communications, 2015, 85 : 1741 - 1764