A survey of key management for secure group communication

被引:484
作者
Rafaeli, S [1 ]
Hutchison, D [1 ]
机构
[1] Univ Lancaster, Fac Sci Appl, Dept Comp, Lancaster LA1 4YR, England
关键词
design; management; security; multicast security; group key distribution;
D O I
10.1145/937503.937506
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.
引用
收藏
页码:309 / 329
页数:21
相关论文
共 42 条
  • [31] PERRIG A, 2001, P IEEE S SEC PRIV OA
  • [32] Rafaeli S, 2002, P 11 IEEE INT WETICE
  • [33] Rivest Ronald L., 1992, 1321 RFC
  • [34] Rodeh O., 2000, NETWORK DISTRIBUTED
  • [35] Schneier Bruce, 1996, APPL CRYPTOGRAPHY
  • [36] SETIA S, 2000, P IEEE S SEC PRIV OA
  • [37] Steiner M., 1996, 3rd ACM Conference on Computer and Communications Security, P31, DOI 10.1145/238168.238182
  • [38] The VersaKey framework: Versatile group key management
    Waldvogel, M
    Caronni, G
    Sun, D
    Weiler, N
    Plattner, B
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (09) : 1614 - 1631
  • [39] Wallner D., 1999, 2627 RFC
  • [40] Wegener Ingo, 1987, The complexity of Boolean functions