TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Ancestors protocol for scalable key management
 
Options

Ancestors protocol for scalable key management

Publikationstyp
Conference Paper
Date Issued
2010-06
Sprache
English
Author(s)
Gollmann, Dieter  
Omara, Fatma A.  
Zaki, Shrief Ibrahem  
Abo El Soud, Mohamed W.  
Institut
Sicherheit in verteilten Anwendungen E-15  
TORE-URI
http://hdl.handle.net/11420/4253
Journal
Egyptian Informatics Journal  
Volume
11
Issue
1
Start Page
11
End Page
17
Citation
Egyptian Informatics Journal 1 (11): 11-17 (2010)
Contribution to Conference
7th International Conference on Informatics and Systems, INFOS2010  
Publisher DOI
10.1016/j.eij.2010.06.002
Scopus ID
2-s2.0-78649950371
Publisher
Elsevier
Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK). According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK). These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.
Subjects
Area security agents
Clusters
Confidentiality
Cost function
Group key management
Multicast
DDC Class
004: Informatik
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback