An Efficient And Secure Multicast Key Management Scheme Based On Star Topology"

979 words - 4 pages

With the growth of Internet, the usage of group communication becomes more popular. These applications include the pay TV channels, secure videoconferencing, multi-partner military action, wireless sensor, and ad hoc networks. In today’s era, information security is the prime concern as with the technological advancements, the attackers are provided with more powerful and sophisticated tools. Today, the Internet is not totally secure for privacy. The usage of multicast applications increases day by day so it needs secure multicast services.
Multicasting is a simple way to send one stream of data to multiple users simultaneously. It helps in reducing the required bandwidth significantly, as ...view middle of the document...

Communication cost in LKH reduces from O(n) to O(logn) in the rekeying method, where n is the number of group members. One-way function (OFT) scheme was proposed by Sherman and McGrew [5] to reduce the communication cost from 2log2n−1 to log2n. These schemes need to rekeying message whenever member joins/leaves the group [3, 4, 5, 6, 7] . To overcome the above problem, Lin et al. [2] proposed the SBMK scheme using the star based architecture, in which there is no need for rekeying when a member joins and leaves the group. In SBMK, secret key is calculated by the key server using RSA algorithm [10] and then is unicast to every group member separately. Therefore, it increases the burden on the server. Efficient star topology based multicast key management algorithm was proposed by Saravanan, K. and T. Purusothaman [1] which is based on RSA algorithm [10] in which secret keys are calculated by the group members. This eliminates the need to unicast the secret keys to every member separately, henceforth, reducing the load on the server to great extent. In that scheme when a member A leaves the group, the forward secrecy is thwarted if pA equals pB or qB and qA equals pC or qC, where pi, q¬i for i €{A, B, C} represents the prime numbers of members A, B, C. Also, when a new joining members D selects the prime numbers such that pD equals pE or qE and qD equals pF or qF for some anonymous members E and F, then the backward secrecy is violated. In this paper, we proposed an improvement on the Saravanan-Purusothaman scheme to solve the above problem. The proposed scheme preserves the forward secrecy and backward secrecy in multicast group key management and therefore, is more secure.
The proposed scheme differs from the previous work as it is always maintaining the forward and backward secrecy. In addition, our scheme does not need to maintain the key tree topology [3, 4, 5, 6, 7] and eliminates the rekeying process whenever...

Find Another Essay On An Efficient and Secure Multicast Key Management Scheme based on star topology"

key management for multicast groups using broadcast encryptionand groupkey agreement

848 words - 4 pages is applied to an encrypted message, E(P), then the original plain text message is acquired back.For second condition,D cannot be deduced from E. E is the encryption key, so it E cannot be made public. 6. PROPOSED SYSTEM MODEL The proposed concept is a key management scheme which is developed from the combination of two multicast scenarios [14] which are Broadcast encryption and group key agreement. In Broadcast Encryption [15], trusted center

Project management should based on knowledge and people

934 words - 4 pages Project management is a art of balance. The progress of the project implementation is just like a tough journey. Project management is the key to ensure success, while a mature system of project management is a powerful tool of project manager. The successful of the project, instead of the project management process, is the final target of all related parties. Project management, project target and specific task are all based on knowledge, but

An Organizational Structure Based on Risk and Quality Fundamentals

1523 words - 7 pages , tactical and operational levels, and its embodiment in all tasks and roles is required; it is a consistent manner for an organisations’ operation, which leads to effective decision making, efficient allocation and protection of the organisational assets, and enrichment of the organisational knowledge database. In alignment with the risk levels discussed by IRM-AIRMIC-ALARM (2002) and USDHS (2011), discusses the organisational risk categories; it

An Organizational Structure Based on Risk and Quality Fundamentals

1317 words - 6 pages organisational policies and will not provoke negative side effects due to lack of the big picture, an additional “Plan” stage between “Check” and “Act” is considered essential. Therefore, the complete cycle on the scope of more effective organisational management would be: “Plan-Do-Check-Plan-Act”. • After the organisations’ initial development and the beginning of production and operations, the first two stages of the aforementioned modified cycle are

The Advisory, Conciliation and Arbitration Scheme (ACAS), an analysis

2429 words - 10 pages The Advisory, Conciliation and Arbitration Service (ACAS)HistoryBefore analysing the ACAS Arbitration Scheme, a brief history of the organisation will be offered, whereby providing a more thorough understanding of the subject as a whole.The ACAS Arbitration scheme was established on the 2nd of September, 1974. Initially the organisation was known as the "Conciliation and Arbitration Service". It was renamed the "Advisory, Conciliation and

An Experiment Based on Phtosynthesis

1369 words - 6 pages The first step was to get a TLC plate and draw a line straight across it from the bottom, on the dull side. The dull side was used because it has more silica on it. The solvent, Toluene and acetone, was then placed into a beaker approximately 3-5mm deep. A lead was ripped up into fine pieces and placed into a mortar, along with acetone on top of pieces that barely covered the top of them. Anhydrous magnesium sulfate was placed in the mortar to

A Cross-Layer Adaptive Modulation and Coding Scheme for realistic OFDMA-based Systems

2615 words - 10 pages estimation errors; it is simply based on adjusting MCS-SNR threshold table on the move to reduce errors or enhance throughput, whenever extreme cases of erroneous or error-free transmissions occur for certain MCS. The rest of this letter is organized as follows. Section II introduces system model and basic idea of conventional AMC scheme. Section III states the motivations behind this work and presents detailed description of proposed scheme

An Efficient Hierarchy/Graph Texts Organization and Representation Schema

787 words - 4 pages looks something like (TOP (S (NP ----) (VP ----))). A sentence (S) is represented by the parser as a tree having three children: a noun phrase (NP), a verbal phrase (VP) and the full stop (.), and the root of the tree will be S. Further theories of core grammar for syntactic analysis can be found in [17]. Semantic analysis is the study of the meaning based on the POS tags and syntactic elements mentioned previously and which can be linked in the

Team based management is essential for better organizational control. However introducing team based management is not possible without affecting the structure and culture of an organization

1651 words - 7 pages teams work in a organized way and accomplish the work in a specified time. Team members solve the problem together in a short time, foster innovation and creativity.Introducing team based management in an organization depends on its culture and structure. Without changing the structure team based management can not be effective for organization. Organizational structures should be adaptive to process requirements, aiming to optimize the ratio of

How managers design a reward scheme within an organisation and evaluate

753 words - 3 pages argues that deviating from the "market" rate would negatively impact on firm profits. By contract the "efficiency wage hypothesis" argues that paying above market wages may be more "efficient". Then we should focus on some key points on the efficiency wage hypothesis. Higher relative salary could give employer an advantage in the labour market, reduce performance problems and labour turnover, and then employee may increase effort and performance

Mindfulness and Decision Making: Analysis of a Popular Press Article Based on an Empirical

1072 words - 5 pages result in making "smarter" decisions. Bergland based this claim on a an empirical study conducted by Andrew Hafenbrack, Zoe Kinias, and Sigal Barsade, published in the peer-reviewed Journal of Psychological Science (2014). This article (Bergland, 2014) proposes that doing meditation prevents succumbing sunk cost bias, defined in the peer-reviewed article (Hafenbrack et al., 2014) as the propensity to continue and endeavor after money, time, or

Similar Essays

Efficient And Secure Star Topology Based Multicast Key Management Algorithm

1470 words - 6 pages and private key d4.Thus, backward secrecy is violated 3. Proposed Scheme In this section, we describe the proposed scheme which is based on RSA algorithm [11]. Our scheme differs from the Saravanan-Purusothaman scheme[4] as it based on the uniqueness of the Xi values, but our scheme states that even the prime factors contributing to the Xi values must be unique. This characteristic always maintains the forward and backward secrecy in the

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

946 words - 4 pages place to another place and it forms the own topology themself. And each nodes are powered by batteries with a limited energy, wherein each node stops functioning when batteries get sanitations. For energy efficient and maximize lifetime of nodes we introduce techniques aimed to minimize power consumption of all nodes by using multicast routing protocol. Multicast routing protocol is independent of unicast routing protocol. Multicast source node

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

585 words - 3 pages itself. Hence, in core based multicast tree, shortest path from the source node to the destination node cannot be guaranteed, but only one tree would be needed to connect the set of the source nodes to a set of the receiver nodes. And many MANET has limited energy resources (battery), and each node operates in unattended manner. So energy efficient is an import design consideration for these networks. So we proposed energy efficient paper using

Key Management For Multicast Groups Using Broadcast Encryption And Group Key Agreement

583 words - 3 pages of trusted aspect. In section III gives a details view to design a secure key management model for Thailand quantum cryptography network based on custom protocols and step of work. Section IV shows an experimental result of the quantum key generation updated in real time.