메뉴 건너뛰기




Volumn 72, Issue , 2015, Pages 1-16

Key management paradigm for mobile secure group communications: Issues, solutions, and challenges

Author keywords

Group key management; Host mobility; Key management; Secure group communication; Wireless

Indexed keywords

COMPLEX NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; ENVIRONMENTAL MANAGEMENT; MOBILE SECURITY; RADIO; WIRELESS NETWORKS;

EID: 84936971520     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2015.05.008     Document Type: Article
Times cited : (14)

References (84)
  • 3
    • 20744460459 scopus 로고    scopus 로고
    • Internet multicast video delivery
    • A. Ganjam, Z. Hui Internet multicast video delivery Proc. IEEE 93 2005 159 170
    • (2005) Proc. IEEE , vol.93 , pp. 159-170
    • Ganjam, A.1    Hui, Z.2
  • 4
    • 84875668050 scopus 로고    scopus 로고
    • Video multicast over WLANs: Power saving and reliability perspectives
    • Y. Shin, M. Choi, J. Koo, S. Choi Video multicast over WLANs: power saving and reliability perspectives IEEE Network 27 2013 40 46
    • (2013) IEEE Network , vol.27 , pp. 40-46
    • Shin, Y.1    Choi, M.2    Koo, J.3    Choi, S.4
  • 5
    • 79958760133 scopus 로고    scopus 로고
    • Mobile application market: A developer's perspective
    • A. Holzer, J. Ondrus Mobile application market: a developer's perspective Telemat. Inform. 28 2011 22 31
    • (2011) Telemat. Inform. , vol.28 , pp. 22-31
    • Holzer, A.1    Ondrus, J.2
  • 9
    • 36849063206 scopus 로고    scopus 로고
    • Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
    • P. Sakarindr, N. Ansari Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks IEEE Wireless Commun. 14 2007 8 20
    • (2007) IEEE Wireless Commun. , vol.14 , pp. 8-20
    • Sakarindr, P.1    Ansari, N.2
  • 10
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • P. Judge, M. Ammar Security issues and solutions in multicast content distribution: a survey IEEE Network 17 2003 30 36
    • (2003) IEEE Network , vol.17 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 11
    • 34548827597 scopus 로고    scopus 로고
    • A study of different types of attacks on multicast in mobile ad hoc networks
    • H.L. Nguyen, U.T. Nguyen A study of different types of attacks on multicast in mobile ad hoc networks Ad Hoc Networks 6 2008 32 46
    • (2008) Ad Hoc Networks , vol.6 , pp. 32-46
    • Nguyen, H.L.1    Nguyen, U.T.2
  • 12
    • 78650326704 scopus 로고    scopus 로고
    • Survey of security services on group communications
    • P. Sakarindr, N. Ansari Survey of security services on group communications IET Inf. Secur. 4 2010 258 272
    • (2010) IET Inf. Secur. , vol.4 , pp. 258-272
    • Sakarindr, P.1    Ansari, N.2
  • 13
    • 33746915060 scopus 로고    scopus 로고
    • Multicast Security (MSEC) Group Key Management Architecture
    • Internet Engineering Task Force
    • M. Baugher, R. Canetti, L. Dondeti, F. Lindholm, Multicast Security (MSEC) Group Key Management Architecture. RFC 4046, Internet Engineering Task Force, 2005.
    • (2005) RFC , vol.4046
    • Baugher, M.1    Canetti, R.2    Dondeti, L.3    Lindholm, F.4
  • 16
    • 79951872116 scopus 로고    scopus 로고
    • Multicast mobility in mobile IP version 6 (MIPv6): Problem statement and brief survey
    • Internet Engineering Task Force
    • T. Schmidt, M. Waehlisch, G. Fairhurst, Multicast mobility in mobile IP version 6 (MIPv6): problem statement and brief survey. RFC 5757, Internet Engineering Task Force, 2010.
    • (2010) RFC , vol.5757
    • Schmidt, T.1    Waehlisch, M.2    Fairhurst, G.3
  • 17
    • 82155185191 scopus 로고    scopus 로고
    • Review of multicast routing mechanisms in mobile ad hoc networks
    • R.C. Biradar, S.S. Manvi Review of multicast routing mechanisms in mobile ad hoc networks J. Network Comput. Appl. 35 2012 221 239
    • (2012) J. Network Comput. Appl. , vol.35 , pp. 221-239
    • Biradar, R.C.1    Manvi, S.S.2
  • 18
    • 77955205667 scopus 로고    scopus 로고
    • Mobile IPv6 fast handovers
    • Internet Engineering Task Force
    • R. Koodli, Mobile IPv6 fast handovers. RFC 5568, Internet Engineering Task Force, 2009.
    • (2009) RFC , vol.5568
    • Koodli, R.1
  • 19
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli, D. Hutchison A survey of key management for secure group communication ACM Comput. Surv. 35 2003 309 329
    • (2003) ACM Comput. Surv. , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 20
    • 33748118047 scopus 로고    scopus 로고
    • Group key management protocols: A novel taxonomy
    • Y. Challal, H. Seba Group key management protocols: a novel taxonomy Int. J. Inf. Technol. 2 2005 105 118
    • (2005) Int. J. Inf. Technol. , vol.2 , pp. 105-118
    • Challal, Y.1    Seba, H.2
  • 21
    • 79958241078 scopus 로고    scopus 로고
    • Scalable group key management for secure multicast: A taxonomy and new directions
    • Springer US
    • S. Zhu, S. Jajodia Scalable group key management for secure multicast: a taxonomy and new directions Network Security 2010 Springer US 57 75
    • (2010) Network Security , pp. 57-75
    • Zhu, S.1    Jajodia, S.2
  • 23
    • 0003285503 scopus 로고    scopus 로고
    • Group Key Management Protocol (GKMP) Specification
    • Internet Engineering Task Force
    • H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Specification. RFC 2093, Internet Engineering Task Force, 1997.
    • (1997) RFC , vol.2093
    • Harney, H.1    Muckenhirn, C.2
  • 24
    • 0003285503 scopus 로고    scopus 로고
    • Group Key Management Protocol (GKMP) Architecture
    • Internet Engineering Task Force
    • H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture. RFC 2094, Internet Engineering Task Force, 1997.
    • (1997) RFC , vol.2094
    • Harney, H.1    Muckenhirn, C.2
  • 26
    • 0003259063 scopus 로고    scopus 로고
    • Key Management for Multicast: Issues and Architectures
    • Internet Engineering Task Force
    • D. Wallner, E. Harder, R. Agee, Key Management for Multicast: Issues and Architectures. RFC 2627, Internet Engineering Task Force, 1999.
    • (1999) RFC , vol.2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 27
    • 45049084932 scopus 로고    scopus 로고
    • Optimizing deletion cost for secure multicast key management
    • Z.-Z. Chen, Z. Feng, M. Li, F. Yao Optimizing deletion cost for secure multicast key management Theor. Comput. Sci. 401 2008 52 61
    • (2008) Theor. Comput. Sci. , vol.401 , pp. 52-61
    • Chen, Z.-Z.1    Feng, Z.2    Li, M.3    Yao, F.4
  • 29
    • 33744999657 scopus 로고    scopus 로고
    • Scalable balanced batch rekeying for secure group communication
    • W.H. Desmond Ng, H. Cruickshank, Z. Sun Scalable balanced batch rekeying for secure group communication Comput. Secur. 25 2006 265 273
    • (2006) Comput. Secur. , vol.25 , pp. 265-273
    • Desmond Ng, W.H.1    Cruickshank, H.2    Sun, Z.3
  • 30
    • 33746019294 scopus 로고    scopus 로고
    • An extension of secure group communication using key graph
    • Z. Jun, Z. Yu, M. Fanyuan, G. Dawu, B. Yingcai An extension of secure group communication using key graph Inf. Sci. 176 2006 3060 3078
    • (2006) Inf. Sci. , vol.176 , pp. 3060-3078
    • Jun, Z.1    Yu, Z.2    Fanyuan, M.3    Dawu, G.4    Yingcai, B.5
  • 31
    • 34147147912 scopus 로고    scopus 로고
    • Dynamic balanced key tree management for secure multicast communications
    • W.H.D. Ng, M. Howarth, Z. Sun, H. Cruickshank Dynamic balanced key tree management for secure multicast communications IEEE Trans. Comput. 56 2007 590 605
    • (2007) IEEE Trans. Comput. , vol.56 , pp. 590-605
    • Ng, W.H.D.1    Howarth, M.2    Sun, Z.3    Cruickshank, H.4
  • 32
    • 84859897489 scopus 로고    scopus 로고
    • Balanced key tree management for multi-privileged groups using (N, T) policy
    • M. Angamuthu, A. Ramalingam Balanced key tree management for multi-privileged groups using (N, T) policy Secur. Commun. Networks 5 2012 545 555
    • (2012) Secur. Commun. Networks , vol.5 , pp. 545-555
    • Angamuthu, M.1    Ramalingam, A.2
  • 33
    • 84897828952 scopus 로고    scopus 로고
    • Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users
    • Y. Park, D. Je, M. Park, S. Seo Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users IEEE Trans. Mob. Comput. 13 2014 783 796
    • (2014) IEEE Trans. Mob. Comput. , vol.13 , pp. 783-796
    • Park, Y.1    Je, D.2    Park, M.3    Seo, S.4
  • 34
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A.T. Sherman, D.A. McGrew Key establishment in large dynamic groups using one-way function trees IEEE Trans. Software Eng. 29 2003 444 458
    • (2003) IEEE Trans. Software Eng. , vol.29 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 36
    • 54349088694 scopus 로고    scopus 로고
    • Secure and efficient group key management with shared key derivation
    • J.C. Lin, K.H. Huang, F. Lai, H.C. Lee Secure and efficient group key management with shared key derivation Comput. Stand. Interfaces 31 2009 192 208
    • (2009) Comput. Stand. Interfaces , vol.31 , pp. 192-208
    • Lin, J.C.1    Huang, K.H.2    Lai, F.3    Lee, H.C.4
  • 37
    • 79960886232 scopus 로고    scopus 로고
    • Secure group key management using uni-directional proxy re-encryption schemes
    • C. Yi-Ruei, J.D. Tygar, T. Wen-Guey Secure group key management using uni-directional proxy re-encryption schemes Proceedings IEEE INFOCOM 2011 1952 1960
    • (2011) Proceedings IEEE INFOCOM , pp. 1952-1960
    • Yi-Ruei, C.1    Tygar, J.D.2    Wen-Guey, T.3
  • 38
  • 40
    • 15344345559 scopus 로고    scopus 로고
    • A secure and scalable Group key exchange system
    • M. Burmester, Y. Desmedt A secure and scalable Group key exchange system Inf. Process. Lett. 94 2005 137 143
    • (2005) Inf. Process. Lett. , vol.94 , pp. 137-143
    • Burmester, M.1    Desmedt, Y.2
  • 41
    • 77958150942 scopus 로고    scopus 로고
    • Secure group key agreement protocol based on chaotic Hash
    • X. Guo, J. Zhang Secure group key agreement protocol based on chaotic Hash Inf. Sci. 180 2010 4069 4074
    • (2010) Inf. Sci. , vol.180 , pp. 4069-4074
    • Guo, X.1    Zhang, J.2
  • 46
    • 34248380150 scopus 로고    scopus 로고
    • M-CLIQUES: Modified CLIQUES key agreement for secure multicast
    • X. Chen, B.N.W. Ma, C. Yang M-CLIQUES: modified CLIQUES key agreement for secure multicast Comput. Secur. 26 2007 238 245
    • (2007) Comput. Secur. , vol.26 , pp. 238-245
    • Chen, X.1    Ma, B.N.W.2    Yang, C.3
  • 47
    • 33749609746 scopus 로고    scopus 로고
    • A communication-computation efficient group key algorithm for large and dynamic groups
    • S. Zheng, D. Manz, J. Alves-Foss A communication-computation efficient group key algorithm for large and dynamic groups Comput. Networks 51 2007 69 93
    • (2007) Comput. Networks , vol.51 , pp. 69-93
    • Zheng, S.1    Manz, D.2    Alves-Foss, J.3
  • 49
    • 77958458851 scopus 로고    scopus 로고
    • Efficient cluster-based group key agreement protocols for wireless ad hoc networks
    • E. Konstantinou Efficient cluster-based group key agreement protocols for wireless ad hoc networks J. Network Comput. Appl. 34 2011 384 393
    • (2011) J. Network Comput. Appl. , vol.34 , pp. 384-393
    • Konstantinou, E.1
  • 50
    • 84865071791 scopus 로고    scopus 로고
    • Group key agreement for secure group communication in dynamic peer systems
    • X. Lv, H. Li, B. Wang Group key agreement for secure group communication in dynamic peer systems J. Parallel Distrib. Comput. 72 2012 1195 1200
    • (2012) J. Parallel Distrib. Comput. , vol.72 , pp. 1195-1200
    • Lv, X.1    Li, H.2    Wang, B.3
  • 52
    • 2942564655 scopus 로고    scopus 로고
    • A scalable and distributed multicast security protocol using a subgroup-key hierarchy
    • A. Heba K A scalable and distributed multicast security protocol using a subgroup-key hierarchy Comput. Secur. 23 2004 320 329
    • (2004) Comput. Secur. , vol.23 , pp. 320-329
    • Heba, K.A.1
  • 53
    • 34848843875 scopus 로고    scopus 로고
    • A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    • A. Nemaney Pour, K. Kumekawa, T. Kato, S. Itoh A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation Comput. Networks 51 2007 4727 4743
    • (2007) Comput. Networks , vol.51 , pp. 4727-4743
    • Nemaney Pour, A.1    Kumekawa, K.2    Kato, T.3    Itoh, S.4
  • 55
    • 46849100481 scopus 로고    scopus 로고
    • A scalable key management and clustering scheme for wireless ad hoc and sensor networks
    • J.H. Li, B. Bhattacharjee, M. Yu, R. Levy A scalable key management and clustering scheme for wireless ad hoc and sensor networks Future Gener. Comput. Syst. 24 2008 860 869
    • (2008) Future Gener. Comput. Syst. , vol.24 , pp. 860-869
    • Li, J.H.1    Bhattacharjee, B.2    Yu, M.3    Levy, R.4
  • 56
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra Iolus: a framework for scalable secure multicasting SIGCOMM Comput. Commun. Rev. 27 1997 277 288
    • (1997) SIGCOMM Comput. Commun. Rev. , vol.27 , pp. 277-288
    • Mittra, S.1
  • 57
    • 77953145198 scopus 로고    scopus 로고
    • Adaptive clustering for scalable key management in dynamic group communications
    • Y. Challal, S. Gharout, A. Bouabdallah, H. Bettahar Adaptive clustering for scalable key management in dynamic group communications Int. J. Secur. Networks 3 2008 133 146
    • (2008) Int. J. Secur. Networks , vol.3 , pp. 133-146
    • Challal, Y.1    Gharout, S.2    Bouabdallah, A.3    Bettahar, H.4
  • 58
    • 40849124634 scopus 로고    scopus 로고
    • Performance optimization of region-based group key management in mobile ad hoc networks
    • J.-H. Cho, I.-R. Chen, D.-C. Wang Performance optimization of region-based group key management in mobile ad hoc networks Perform. Eval. 65 2008 319 344
    • (2008) Perform. Eval. , vol.65 , pp. 319-344
    • Cho, J.-H.1    Chen, I.-R.2    Wang, D.-C.3
  • 59
    • 84862516726 scopus 로고    scopus 로고
    • Scalable and efficient approach for secure group communication using proxy cryptography
    • Y. Shin, J. Hur Scalable and efficient approach for secure group communication using proxy cryptography Wireless Network 18 2012 413 425
    • (2012) Wireless Network , vol.18 , pp. 413-425
    • Shin, Y.1    Hur, J.2
  • 60
    • 84877752219 scopus 로고    scopus 로고
    • Polynomial-based key management for secure intra-group and inter-group communication
    • Y. Piao, J. Kim, U. Tariq, M. Hong Polynomial-based key management for secure intra-group and inter-group communication Comput. Math. Appl. 65 2013 1300 1309
    • (2013) Comput. Math. Appl. , vol.65 , pp. 1300-1309
    • Piao, Y.1    Kim, J.2    Tariq, U.3    Hong, M.4
  • 61
    • 21944433610 scopus 로고    scopus 로고
    • Issues in integrating cellular networks WLANs, and MANETs: A futuristic heterogeneous wireless network
    • D. Cavalcanti, D. Agrawal, C. Cordeiro, X. Bin, A. Kumar Issues in integrating cellular networks WLANs, AND MANETs: a futuristic heterogeneous wireless network IEEE Wireless Commun. 12 2005 30 41
    • (2005) IEEE Wireless Commun. , vol.12 , pp. 30-41
    • Cavalcanti, D.1    Agrawal, D.2    Cordeiro, C.3    Bin, X.4    Kumar, A.5
  • 63
    • 0742294233 scopus 로고    scopus 로고
    • Mobile ad hoc networking: Imperatives and challenges
    • I. Chlamtac, M. Conti, J.J.N. Liu Mobile ad hoc networking: imperatives and challenges Ad Hoc Networks 1 2003 13 64
    • (2003) Ad Hoc Networks , vol.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2    Liu, J.J.N.3
  • 68
    • 70349229794 scopus 로고    scopus 로고
    • Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
    • May
    • S. Kelly, S. Frankel, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, RFC 4868, May 2007.
    • (2007) RFC , vol.4868
    • Kelly, S.1    Frankel, S.2
  • 70
    • 84979062404 scopus 로고    scopus 로고
    • A new multiple service key management scheme for secure wireless mobile multicast
    • R. Abd-Alhameed, T. Mapoka, S. Shepherd A new multiple service key management scheme for secure wireless mobile multicast IEEE Trans. Mob. Comput. PP 2014 1 14
    • (2014) IEEE Trans. Mob. Comput. , vol.PP , pp. 1-14
    • Abd-Alhameed, R.1    Mapoka, T.2    Shepherd, S.3
  • 72
    • 0038391332 scopus 로고    scopus 로고
    • Reduction in control overhead for a secure, scalable framework for mobile multicast
    • S. Kamat, S. Parimi, D.P. Agrawal Reduction in control overhead for a secure, scalable framework for mobile multicast IEEE International Conference 101 2003 98 103
    • (2003) IEEE International Conference , vol.101 , pp. 98-103
    • Kamat, S.1    Parimi, S.2    Agrawal, D.P.3
  • 73
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Y. Sun, W. Trappe, K.J.R. Liu A scalable multicast key management scheme for heterogeneous wireless networks IEEE/ACM Trans. Networking 12 2004 653 666
    • (2004) IEEE/ACM Trans. Networking , vol.12 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 78
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area rekeying algorithms for secure wireless group communications
    • C. Zhang, B. DeCleene, J. Kurose, D. Towsley Comparison of inter-area rekeying algorithms for secure wireless group communications Perform. Eval. 49 2002 1 20
    • (2002) Perform. Eval. , vol.49 , pp. 1-20
    • Zhang, C.1    DeCleene, B.2    Kurose, J.3    Towsley, D.4
  • 79
    • 32644441025 scopus 로고    scopus 로고
    • Scalable key management for secure multicast communication in the mobile environment
    • J. Cao, L. Liao, G. Wang Scalable key management for secure multicast communication in the mobile environment Pervasive Mob. Comput. 2 2006 187 203
    • (2006) Pervasive Mob. Comput. , vol.2 , pp. 187-203
    • Cao, J.1    Liao, L.2    Wang, G.3
  • 80
    • 34547743395 scopus 로고    scopus 로고
    • A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    • N.C. Wang, S.Z. Fang A hierarchical key management scheme for secure group communications in mobile ad hoc networks J. Syst. Software 80 2007 1667 1677
    • (2007) J. Syst. Software , vol.80 , pp. 1667-1677
    • Wang, N.C.1    Fang, S.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.