• DocumentCode
    515428
  • Title

    Ancestors protocol for Scalable key management

  • Author

    Gollmann, Dieter ; Omara, Fatma A. ; Zaki, Shrief Ibrahem ; El Soud, Mohamed W Abo

  • Author_Institution
    Dept. of Security, Hamburg-Harburg Univ., Hamburg, Germany
  • fYear
    2010
  • fDate
    28-30 March 2010
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK). According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK). These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the decryption/ re-encryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.
  • Keywords
    cryptographic protocols; multicast protocols; public key cryptography; adaptive clustering; ancestors protocol; multicast architecture; multicast group; scalable group key management; traffic encryption key; Computer architecture; Computer science; Computer security; Cost function; Cryptography; Data security; Internet; Irrigation; Mathematics; Multicast protocols; Area Security Agents; Clusters; Confidentiality; Group Key Management; Multicast;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Informatics and Systems (INFOS), 2010 The 7th International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-4244-5828-8
  • Type

    conf

  • Filename
    5461822