DocumentCode :
2679307
Title :
Key Management and Distribution for Authenticating Group Communication
Author :
Shantharajah, S.P. ; Duraiswamy, K. ; Kadhar Nawaz, G.M.
Author_Institution :
Dept. of Comput. Applications, Sona Coll. of Technol., Tamil Nadu
fYear :
2006
fDate :
8-11 Aug. 2006
Firstpage :
133
Lastpage :
137
Abstract :
In network communication, security is essential to prevent intruder´s attack; Where Authentication plays a vital role so as to ensure the right participant in communication. To authenticate a group of users and to hold confidentiality between them a new approach of key management is handled in this paper. This key management presentation is a group key used for cryptography process that provides security with less computation complexity, which leads to fast and easy authentication. Here, a tree based key management scheme has been designed through which the key distribution among the users involves authentication with less storage complexity too. This paper describes the dynamic membership authentication, which states the communication or transaction between user and required server with a new different instant key that is formed from a group of members who are currently participating in transaction or communication. Releasing or joining a user from the group or to the group is possible so that the key gets changed instantly whenever there is an alteration in current participation of users in communication. With the help of each user´s hidden key an `instant key´ can be computed. As the entire user´s hidden keys are used for obtaining an instant key, it can ensure the authentication among the valid users during communication. So an intruder cannot interrupt any communication between users as the key gets varied often. Thus it supports clear authentication and provides security among group communication
Keywords :
cryptography; message authentication; telecommunication network management; telecommunication security; trees (mathematics); communication network security; computation complexity; cryptography; dynamic membership authentication; group communication; hidden key; instant key; tree based key management; Authentication; Communication industry; Computer industry; Computer network management; Conference management; Cryptography; Educational institutions; Management information systems; Security; Tree data structures; Authentication; Group key; Instant key; dynamic membership; hidden key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial and Information Systems, First International Conference on
Conference_Location :
Peradeniya
Print_ISBN :
1-4244-0322-7
Type :
conf
DOI :
10.1109/ICIIS.2006.365651
Filename :
4216571
Link To Document :
بازگشت