Information Technology Reference
In-Depth Information
et al. [34] show good results and achieve resistance against collusion. Note that
overhead depends, among other values, on the security parameter, which results
in a tradeoff between security and bandwidth usage. Key life-span refers to user
keys lifetime: some schemes, such as Staddon et al. [33] and Liu et al. [34],
require the user key to be renewed after m sessions. That is clearly a drawback
since it increases the workload at the Key Server side and bandwidth usage,
specially in faulty networks which is the case. To conclude, we believe that self-
healing schemes still have several challenges to overcome, mainly: costly setup
phases that must be repeated after m sessions, generalizing a constant use of
storage, going further on bandwidth usage reduction and overcoming the usual
security-communication overhead tradeoff.
5 Conclusions
This paper shows a survey on the field that includes some of the latest propos-
als. Table 4 compares the different schemes introduced along the paper according
to their features: “Cat.”, category, either (1) general-purpose, (2) multi-group
or (3) ad-hoc oriented; “Stful/Stless”, stateful or stateless; “Coll.Res.”, collu-
sion resistant; and “Keys tree”, use of the hierarchical tree approach. Still new
proposals appear each year and, with the popularization of new scenarios like
IPTV and specially ad-hoc networks, the desirable features for a secure multi-
cast scheme are evolving: low bandwidth and faulty links demand to reduce the
number and frequency of communications with the Key Server and the possibil-
ity to recover from information loss. It seems clear that this trend will increase
in the foreseeable future.
References
1. Cisco IOS Secure Multicast, http://www.cisco.com/en/US/prod/collateral/
iosswrel/ps6537/ps6552/prod_white_paper0900aecd8047191e.html
2. Rafaeli, S., Hutchison, D.: A survey of key management for secure group commu-
nication. ACM Comput. Surv. 35(3), 309-329 (2003)
3. Chan, K.-C., Chan, S.-H.G.: Key management approaches to offer data confiden-
tiality for secure multicast. IEEE Network 17(5), 30-39 (2003)
4. Zhu, S., Jajodia, S.: Scalable group key management for secure multicast: A taxon-
omy and new directions. In: Huang, H., MacCallum, D., Du, D.-Z. (eds.) Network
Security, pp. 57-75. Springer, US (2010)
5. Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specifica-
tion. RFC 2093 (1997)
6. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and ar-
chitectures. RFC 2627 (1999)
7. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs.
IEEE/ACM Transactions on Networking 8(1), 16-30 (2000)
8. Chan, K.-C., Chan, S.-H.G.: Distributed servers approach for large-scale secure
multicast. IEEE JSAC 20(8) (October 2002)
9. Chan, K.-C., Chan, S.-H.G.: Distributed servers networks for secure multicast. In:
Proc. IEEE Globecom 2001, San Antonio, TX, pp. 25-29 (2001)
 
Search WWH ::




Custom Search