Skip to main content
Log in

Performance Evaluation of Cost-Effective Multicast–Unicast Key Management Method

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Group key management is one of the key security issues in multicast networks. The main challenge is to provide a secure group key management method which avoids high key update cost in terms of the number of transmitted keys. In order to achieve low key update cost for group key management, most of the existing methods increase their encryption/decryption cycles which requires a strong cryptographic function. In this paper, a cost-effective key management method is proposed to address the problem of high key update cost without increasing the encryption/decryption cycles. We evaluated our proposed method with existing tree-based methods by using Markov chain and Poisson Arrival Process. Results indicate the efficiency of our proposed method in reducing the key update cost significantly compared to the existing tree-based key management methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Wittmann, R., & Zitterbart, M. (2000). Multicast communication: Protocols and applications. Los Altos: Morgan Kaufmann.

    Google Scholar 

  2. Hardjono, T., & Dondeti, L. R. (2003). Multicast and group security. London: Artech House Publishers.

    MATH  Google Scholar 

  3. Naranjo, J., Antequera, N., Casado, L., & Lopez-Ramos, J. (2011) A suite of algorithms for key distribution and authentication in centralized secure multicast environments. Journal of Computational and Applied Mathematics, 236(12), 3042–3051.

    Google Scholar 

  4. Ragab Hassen, H., Bettahar, H., Bouadbdallah, A., & Challal, Y. (2012). An efficient key management scheme for content access control for linear hierarchies. Computer Networks, 56(8), 2107–2118.

    Google Scholar 

  5. Harney, H., & Harder, E. (1999). Logical key hierarchy protocol. Draft-harney-sparta-lkhp-sec-00.txt, IETF Internet Draft (work in progress).

  6. Sherman, A., & McGrew, D. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5), 444–458.

    Google Scholar 

  7. Lin, J.-C., Huang, K.-H., Lai, F., & Lee, H.-C. (2009). Secure and efficient group key management with shared key derivation. Computer Standards & Interfaces, 31, 192–208.

    Article  Google Scholar 

  8. Vijayakumar, P., Bose, S., & Kannan, A. (2012). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.

    Google Scholar 

  9. Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33, 136–148.

    Article  Google Scholar 

  10. Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Kalimuthu, R., & Dharmaraj, R. (2010). Secure group key management scheme for multicast networks. International Journal of Network Security, 11, 30–34.

    Google Scholar 

  11. Mehdizadeh, A., Hashim, F., Abdullah, R. S. A. R., Ali, B. M., Othman, M., & Khatun, S. (2013). Multicast-unicast data delivery method in wireless IPv6 networks. Journal of Network and Systems Management. doi:10.1007/s10922-013-9268-2.

  12. Mehdizadeh, A., Abdullah, R., Azmir, R. S., & Hashim, F. (2012). Secure group communication scheme in wireless IPv6 networks: An experimental test-bed. In International symposium on communications and information technologies (ISCIT) (pp. 724–729), Gold Coast, Australia.

  13. Mehdizadeh, A., & Hashim, F. (2012). Modeling of efficient key management method in multicast networks. In 6th International conference on signal processing and communication systems (ICSPCS 2012), Gold Coast, Australia.

  14. Wallner, D., Harder, E., & Agee, R. (1999). Key management for multicast: Issues and architectures. IETF, RFC 2627.

  15. Bertsekas, D., & Gallager, R. (1992). Data networks. Englewood Cliffs: Prentice-Hall.

    MATH  Google Scholar 

  16. Ching, W. K., & Ng, M. K. (2006). Markov chains: Models, algorithms and applications (Vol. 83). New York: Springer.

    Google Scholar 

  17. Stewart, W. J. (2009). Probability, Markov chains, queues, and simulation: The mathematical basis of performance modeling. Princeton: Princeton University Press.

    Google Scholar 

  18. Gross, D. (2008). Fundamentals of queueing theory. India: Wiley.

    Book  Google Scholar 

  19. Gau, R. H. (2006). Performance analysis of multicast key backbone for secure group communications. IEEE Communications Letters, 10, 555–557.

    MathSciNet  Google Scholar 

  20. Yan, S., Trappe, W., & Liu, K. J. R. (2004). A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking, 12, 653–666.

    Article  Google Scholar 

  21. Ross, S. M. (2009). Introduction to probability models. New York: Academic Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abbas Mehdizadeh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mehdizadeh, A., Hashim, F., Abdullah, R.S.A.R. et al. Performance Evaluation of Cost-Effective Multicast–Unicast Key Management Method. Wireless Pers Commun 77, 2195–2212 (2014). https://doi.org/10.1007/s11277-014-1633-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1633-2

Keywords

Navigation