Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.1.97

Key Management Scheme for Providing the Confidentiality in Mobile Multicast  

Roh Jong-Hyuk (ETRI)
Jin Seung-Hun (ETRI)
Lee Kyoon-Ha (Inha University)
Abstract
For successfully deploying many multicast service in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we propose two methods for designing the key management scheme for the mobile multicast environment. The proposed schemes match the key management tree to the mobile multicast environment for localizing the delivery of he rekeying messages, reducing the communication costs, and solving the handoff problem in wireless region.
Keywords
Mobile Multicast; Multicast Security; Key Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B.DeCleene, L.Dondeti, S.Griffin, T. Hardjono, D.Kiwior, J.Kurose, D.Towsley, S.Vasudevan, and C.Zhang, 'Secure group communications for wireless networks,' Military Communications Conference. vol. 1. pp. 113-117, Oct. 2001
2 R. D. Pietro, L. V. Mancini, and S. Jajodia, 'Efficient and secure keys management for wireless mobile communications,' Proceedings of the second ACM international workshop on Principles of mobile computing, Oct. 2002
3 K. Chan and S.-H. G. Chan, 'Key Management Approaches to Offer Data Confidentiality for Secure Multicast,' IEEE Network, vol. 17, Sep.-Oct. 2003
4 R. Shankaran, V. Varadharajan, and M. Hitchens, 'A secure multicast support framework for Mobile IP,' IEEE Wireless Communications and Networking, vol. 3, pp. 2114-2119, Mar. 2003
5 R. Prakash, A. Schiper, and M. Mohsin, 'Reliable multicast in mo¬aile networks.' Wireless Communications and Networking, vol. 3, pp. 1807-1812, Mar. 2003
6 C. K. Wong, M. Gouda, and S. S. Lam, 'Secure Group Communications Using Key Graphs,' IEEE/ACM Transactions on Networking, vol. 8, pp. 16-29, Feb. 2000   DOI   ScienceOn
7 Y. Sun, W. Trappe, and K.J.R. Liu, 'A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,' IEEE/ACM Transaction on Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004   DOI   ScienceOn
8 D. Bruschi and E. Rosti, 'Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues,' Mobile Networks and Applications, vol. 7, no. 6, Dec. 2002
9 I. Romdhani, M. Kellil, and H.-Y. Lach, 'IP Mobile Multicast: Challenges and Solutions,' IEEE Communications Society Surveys and Tutorials First Quarter 2004
10 S. Mittra, 'Iolus: A framework for Scalable Secure Multicasting,' Proceedings of ACM SIGCOMM'97. pp. 277-288, 1997