ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Key Management for Secure Overlay Multicast
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jong-Hyuk Roh, Kyoon-Ha Lee
Issue Date
2005-12
Citation
Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345
Publisher
SKLOIS
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/11599548_29
Abstract
Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM (Key Tree in Overlay Multicast). We described the operations of KTOM and compare the performance with other schemes, namely, host-to-host encryption, whole group encryption and SOT scheme. © Springer-Verlag Berlin Heidelberg 2005.
KSP Keywords
Data Replication, Group management, IS security, Key distribution scheme, Key management, Key tree, Multicast Routing, Multicast group, Overlay Multicast, data encryption, group members