Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.7.913

A Efficient Key Distribution Scheme for Individual/Group Communication on TRS  

Lee, Deok-Gyu (한국전자통신연구원 정보보호연구단)
Park, Yong-Suk (국가보안기술연구소)
Ahn, Jong-Chul (국가보안기술연구소)
Lee, Im-Yeong (순천향대학교 정보기술공학부)
Abstract
It used exclusively the radio communication where is the TRS(Trunked Radio Service) at frequency where the person whom it does is specific with hitherto radio communication method differently frequency of the decimal which is allocated to the relay station it talks the at the room which the multiple user uses with commonness. The TRS system the most big feature is the region multiple group and order communication method. The TRS the composition of system is composed of the multi mind group, the each group is composed of the terminal of the users who have the objective which is similar relates in business contents. With above it follows in same multi objective and the connection of the form which is various or group communication accomplishes and quality case, a possibility a or of having many problem point in key distribution for a large scale communication there is it could be exposed to attack of the form which is various. There is a place where it accomplishes the communication which is safe at the TRS from research which it sees it investigates group key distribution method which is an essential element. The method which it sees when it reduces a communication frequency, it stands but is the user, it proposes the efficient group key distribution method it will be able to accomplish.
Keywords
TRS; Individual Communication; Group Communication; Key Distribution;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 박희운, 이임영, '효율적인 회의용 키 분배 방식에 관한 연구', 한국통신정보보호학회 충청지부, 1999
2 김봉한, 이명선, 이재광, 'Mbone 구현을 위한 IP멀티캐스트 라우팅 프로토콜', 정보처리학회지, Vol.6, No.4, 1999   과학기술학회마을
3 T. Dunigan and C. Cao. Group Key Management. Technical Report ORNL/TM-13470. 1998
4 A. Ballardie, 'Core Based Tree(CBT)Multicast Routing Architecture,' Request for Comments2201, Internet Activities Board, Oct., 1997
5 C. Perkins, 'IP mobility support,' RFC 2002
6 D.A.McGrew and A.T.Sherman, 'Key Establishment in Large Dynamic Groups: Using One-Way Function Trees,' Technical Report 0755, TIS Labs, 1998
7 H. Harney and C. Muckenhirn, 'Group Management Protocol(GKMP) Architecture,' IETF RFC 2094, 1997
8 A. Aziz, T. Markson and Prafullchandra, 'Simple Key-Management Internet Protocols(SKIP),' IETF fraipsec-skip-03.txt, Oct., 1995
9 M. Moyer, J. Rao and P. Rohatgi, 'A Survey of Security Issues in Multicast Communications,' IEEE Network, Nov/Dec, 1999   DOI   ScienceOn
10 K. Matsuura, Y. Zheng and H. Imai, 'Compact and Flexible Resolution of CBT Multicast Key-Distribution,' WWCA98, 1998
11 R. Poovendram, S. Ahmed, S. Corson, and J. Baras. A Scalable Extension of Group Key Management Protocol. 2nd Annual ATRIP Conference, pp.187.191, February, 1998
12 D.A.McGrew and A.T.Sherman, 'Key Establishment in Large Dynamic Groups: Using One-Way Function Trees,' Technical Report 0755, TIS Labs, 1998
13 A. Ballardie, 'Scalable Multicast Key Distribution,' RFC1949, May, 1996
14 R. Poovendram, S. Ahmed, S. Corson, and J. Baras. A Scalable Extension of Group Key Management Protocol. 2nd Annual ATRIP Conference, pp.187.191, February, 1998
15 Guang-huei Chiou, Wen-Tsuen Chen, 'Secure Broad-casting Using the Secure Lock,' IEEE Transactions on Software Engineering, Vol.15, Issue 8, pp.929-934, 1989   DOI   ScienceOn
16 E. Brickell, P. Lee and Y. Yacobi, 'Secure Audio teleconference,' Advances in Cryptology-Crypto '87, Lecture Notes in Computer Science 293, pp.418-42, 1988
17 H. Harney and C. Muckenhirn, 'Group key management protocol (GKMP) architecture,' RFC 2094
18 T. Dunigan and C. Cao. Group Key Management. Technical Report ORNL/TM-13470, 1998
19 Y. Yacobi, 'Attack on the Koyama-Otha Identity-based key distribution systems,' Proceedings of Cryto'87, Lecture Notes in Computer Science no. 293, Springer-Verlag, pp.429-433, 1998
20 K. Koyama and K. Ohta, 'Identity-based conference key distribution systems,' Proceedings of Crypto '87, lecture Notes in Computer Science no. 293, Springer-Verlag, pp.175-184, 1988
21 W. Diffie and M. Hellan, 'New Direction in cryptography,' IEEE Trans, IT-22, pp.644-654, 1976   DOI
22 I. Ingemarsson, D. Tang and C. Wong, 'A Conference key distribution system,' IEEE Trans., It-28, pp.714-720, 1982   DOI
23 M. Burmester and Y. Desmedt, 'A Secure and Efficient Conference Key Distribution Systems,' EUROCRYPT '94, pp.279-290