首页    期刊浏览 2024年10月04日 星期五
登录注册

文章基本信息

  • 标题:An Effective Contributory Re-Keying Approach to Compute Conference Key
  • 本地全文:下载
  • 作者:Thilagavathy, D. ; Rajaram, M.
  • 期刊名称:Journal of Computer Science
  • 印刷版ISSN:1549-3636
  • 出版年度:2011
  • 卷号:7
  • 期号:8
  • 页码:1212-1217
  • DOI:10.3844/jcssp.2011.1212.1217
  • 出版社:Science Publications
  • 摘要:Problem statement: With the explosive growth of and internet and web applications many emerging group-oriented distributed applications such as tele/video-conferencing, multiplayer games are based on group communication model that need security services such as privacy and data integrity Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. There is a need for security services to provide group-oriented communication privacy and data integrity. It is important that members of the group can establish a common secret key for encrypting group communication. A key tree approach has been proposed by many authors to distribute group key in such a way that the rekeying cost scales with the logarithm of the group size for a join or leave request. The efficiency of this key tree approach critically depends on whether the key tree remains balanced over time as members join or leaves Approach: Instead of performing individual re-keying operations, an interval-based approach of re keying is adopted in the proposed scheme. Results: In the proposed scheme Queue-merge algorithm is used for re keying which substantially reduces the computation cost and communication cost. The comparison shows that queue merge algorithm performs better than Batch algorithm in terms of minimizing the key tree and presumes better node density thereby reducing the computation cost. Conclusion: Performance comparison also shows reduced number of renewed nodes for various re keying interval which reduces the communication cost.
  • 关键词:Authentication; dynamic peer groups; group key agreement; secure group communication; re-keying approach; exchange protocol; ad-hoc network; re-keying efficiency; queue-batch algorithm
国家哲学社会科学文献中心版权所有