A survey of key management for secure group communication

被引:484
作者
Rafaeli, S [1 ]
Hutchison, D [1 ]
机构
[1] Univ Lancaster, Fac Sci Appl, Dept Comp, Lancaster LA1 4YR, England
关键词
design; management; security; multicast security; group key distribution;
D O I
10.1145/937503.937506
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.
引用
收藏
页码:309 / 329
页数:21
相关论文
共 42 条
  • [1] [Anonymous], 1305 RFC
  • [2] [Anonymous], RFC 1112
  • [3] BALLARDIE A, 1996, 1949 RFC
  • [4] BALLARDIE A, 1995, P S NETW DISTR SYST
  • [5] BECKER C, 1998, P 5 ACM C COMP COMM
  • [6] Boyd C, 1997, LECT NOTES COMPUT SC, V1270, P294, DOI 10.1007/BFb0027936
  • [7] BRISCOE B, 1999, P 1 INT WORKSH NETW
  • [8] Burmester M., 1994, PROCWORKSHOP THEORY, P275
  • [9] Multicast security: A taxonomy and some efficient constructions
    Canetti, R
    Garay, J
    Itkis, G
    Micciancio, D
    Naor, M
    Pinkas, B
    [J]. IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 708 - 716
  • [10] Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P459