Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.9.3495

A Study of Secure Group Key Management Based on Key-Chain for Multicast Data Transmission  

Kim, Bo-Seung (Dept of computer Science, Soongsil University)
Kim, Jeong-Jai (Dept of computer Science, Soongsil University)
Lee, Ki-Young (S.Net Systems Inc.)
Shin, Yong-Tae (Dept of computer Science, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.9, 2010 , pp. 3495-3501 More about this Journal
Abstract
Because the application simultaneously to transmit large amounts of data (Video conferencing, Internet broadcasting, Online games etc.) to multiple users increases, the importance and utilization of group communication was greater. So the security was recognized as a important issue. To provide security in multicast environment, A study of single group management server using protocol based on Key Tree Scheme was proposed. But the paper proposes secure group key management scheme to be a relatively low-overhead. Therefore proposed paper is demonstrated to be excellent by comparing the effectiveness of existing and proposed group key management scheme.
Keywords
Group-Key; Multicast; Security; Key-Chain;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Alan T. Sherman and David A. McGrew, "Key Establishment in Large Dynamic Groups using One Way Function Trees," IEEE Trans. on Software Engineering, Vol.29, No.5, pp. 444-458, 2003.   DOI
2 T. Hardjono, "Key Management Framework for IP Multicast Infrastructure Security," IS&N99, LNCS 1597, 1999.
3 임효준, 김종권, "계층 비디오 멀티캐스트를 위한 효율적인 키 분배 방법", 정보과학회 논문지, 제27권 4호, pp. 476-481, 2000.   과학기술학회마을
4 홍종준, "PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계", 한국 인터넷 정보학회 논문지, 제3권 5호, pp. 87-94, 2002.   과학기술학회마을
5 Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. and Pinkas, B., "Multicast security: a taxonomy and some efficient constructions," IEEE INFOCOM 99, pp. 708-716, 1999.
6 D. Kosiur, IP Multicasting : The Completer Guide to Interactive Corporate Networks, John Wiley & Sons, Inc., 1998.
7 Moyer MJ, Rao JR, Rohatgi P., "A Survey of Security Issues in Multicast Communications," IEEE Network, V.13 N.6, pp. 12-23, 1999.   DOI
8 Perring, A., Song, D., Canetti, R., Tygar J. D., Briscoe, B., "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction," RFC 4082,June 2005.
9 H.Harney and C. Muckenhirn, "Group Key Management Protocol(GKMP) Specification,", Request for Comments 2093, July 1997.