Research Article

Article:Secure Decentralized Group Key Management through Progressive Approach

by  S. Sandosh, V.Akila, S. Uthayashangar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Issue 10
Published: November 2010
Authors: S. Sandosh, V.Akila, S. Uthayashangar
10.5120/1423-1920
PDF

S. Sandosh, V.Akila, S. Uthayashangar . Article:Secure Decentralized Group Key Management through Progressive Approach. International Journal of Computer Applications. 9, 10 (November 2010), 6-9. DOI=10.5120/1423-1920

                        @article{ 10.5120/1423-1920,
                        author  = { S. Sandosh,V.Akila,S. Uthayashangar },
                        title   = { Article:Secure Decentralized Group Key Management through Progressive Approach },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 9 },
                        number  = { 10 },
                        pages   = { 6-9 },
                        doi     = { 10.5120/1423-1920 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A S. Sandosh
                        %A V.Akila
                        %A S. Uthayashangar
                        %T Article:Secure Decentralized Group Key Management through Progressive Approach%T 
                        %J International Journal of Computer Applications
                        %V 9
                        %N 10
                        %P 6-9
                        %R 10.5120/1423-1920
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Multicast routing protocols are widely used as efficient communication methods for Group-oriented applications. Decentralized system is preferred to improve bandwidth economization. However, security with the key management for such protocols re-mains a significant problem. In this paper, a secure group key agreement over decentralized systems is proposed. The proposed system is based on the use of progressive approach which is a step by step improvement process. The main advantage of our proposed system is the periodic Authentication of group key members.

References
  • Bibo Jiang and Xiulin Hu, Wuhan,“A Survey of Group Key Management,”CSSE 1282,VOL:12, IEEE Nov 2008 .
  • Feng Zhu, Wei Zhu, Matt W. Mutka, “Private and Secure Service Discovery via Progressive and Probabilistic Exposure” VOL. 18, NO. 11, IEEE November 2008.
  • C. Kenneth Miller, The Internet Protocol Journal - Volume 1, No. 2 “Reliable Multicast Protocols and Applications”, September 1998 StarBurst Communications.
  • E. Michail, A.P. Kakarountas, A. Milidonis, “Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 Hash function”©2004 IEEE.
  • Raul Monroy and Graham Steel, “Faulty Group Protocols Version 1.0”, February 2007.
  • M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B.Smith, and L. Yu, “Negotiating Trust on the Web,” IEEE Internet Computing, pp. 30-37,IEEE Dec 2002.
  • F. Zhu, M. Mutka, and L. Ni, “Service Discovery in Pervasive Computing Environments,” Pervasive Computing, vol. 4, pp. 81-90, IEEE Oct 2005.
  • F. Zhu, M. Mutka, and L. Ni, “A Private, Secure and User-CentricInformation Exposure Model for Service Discovery Protocols,”. Mobile Computing, vol. 5, pp. 418-429, IEEE 2006.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Secure Decentralized Key Management Multicast

Powered by PhDFocusTM