2000
DOI: 10.1145/357830.357834
|View full text |Cite
|
Sign up to set email alerts
|

Scalable multicast security with dynamic recipient groups

Abstract: In this article we propose a new framework for multicast security based on distributed computation of security transforms by intermediate nodes. The involvement of intermediate nodes in the security process causes a new type of dependency between group membership and the topology of the multicast network. Thanks to this dependency, the containment of security exposures in large multicast groups is ensured. The framework also ensures both the scalability for large dynamic groups and the security of individual m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2003
2003
2006
2006

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…This is similar to the Iolus approach [6] and the physical tree approach in [5]. However, in our approach we take into account MANET constraints.…”
Section: Physical Security Group Tree and Group Discoverymentioning
confidence: 99%
See 1 more Smart Citation
“…This is similar to the Iolus approach [6] and the physical tree approach in [5]. However, in our approach we take into account MANET constraints.…”
Section: Physical Security Group Tree and Group Discoverymentioning
confidence: 99%
“…Previous research in the area of secure multicast has mainly focused on wired networks and various techniques were proposed considering various constraints [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. The main limitation of these algorithms is that they were not designed for multihop wireless ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…Basically, the technique is derived from the cipher sequence [5] framework. However, instead of composing cryptography functions, the operation is done for secret keys.…”
Section: Key Compositionmentioning
confidence: 99%
“…Due to the lack of security considerations for multicast protocols, several researches [1][2][3][4][5] have been done to establish secure communications over multicast trees. Although these mechanisms could efficiently achieve key agreements in one multicast group, they may require a centralized key server, not scale well, or leak content during message delivery.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the cost of key-update communications is high. Since 1997, many key-management schemes for secure multicast or group communications have been proposed 2,9,10,12,[16][17][18] to minimize the cost of key-update communications and key-storage requirements. All these schemes are based on a hierarchical tree structure and there is always a group controller (GC).…”
mentioning
confidence: 99%