Analysis of Tree structure for Secure Group Communication Using LKH Approach
Aparna S. Pande1 , Yashwant V. Joshi2 , Manisha Y. Joshi3 , Lalitkumar Wadhwa4
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 1130-1136, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11301136
Online published on Mar 31, 2019
Copyright © Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa, “Analysis of Tree structure for Secure Group Communication Using LKH Approach,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1130-1136, 2019.
MLA Style Citation: Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa "Analysis of Tree structure for Secure Group Communication Using LKH Approach." International Journal of Computer Sciences and Engineering 7.3 (2019): 1130-1136.
APA Style Citation: Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa, (2019). Analysis of Tree structure for Secure Group Communication Using LKH Approach. International Journal of Computer Sciences and Engineering, 7(3), 1130-1136.
BibTex Style Citation:
@article{Pande_2019,
author = { Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa},
title = {Analysis of Tree structure for Secure Group Communication Using LKH Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {1130-1136},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3978},
doi = {https://doi.org/10.26438/ijcse/v7i3.11301136}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.11301136}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3978
TI - Analysis of Tree structure for Secure Group Communication Using LKH Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 1130-1136
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
598 | 305 downloads | 200 downloads |
Abstract
Logical Key Hierarchy is a scalable and efficient method to achieve logarithmic rekeying cost in secure group communication. In applications like pay per view, video conferencing with multiple rekeying operations, the key tree will be unbalanced and will generate worst case rekeying cost. With each join, leave operation we change group key, as well as update all keys along the key path of join/leave user. Key aspect in secure group communication is maintained balanced key tree and achieving logarithmic rekeying cost. In this paper improvement in Non-split balancing high order tree is proposed. I-NSBHO (improved Non Split Balancing High order tree) with proposed Join user algorithm and leave user algorithm maintains balance of tree and always achieve logarithmic rekeying cost. Our experimental result shows the achieved improvement in rekeying cost of I-NSBHO join and leave operations compared to original NSBHO join and leave operations. With Node pruning I-NSBHO improves join cost and maintains logarithmic Rekeying cost for leave operation
Key-Words / Index Term
Secure Group Communication, NSBHO Tree, Logical Key Hierarchy, Message cost, Rekeying, Key tree, key path, Logarithmic Rekeying Cost)
References
[1] Takahito Sakamoto, Takashi Tsuji, Yuichi Kaji. "Group key rekeying using the LKH tech-nique and the Huffman algorithm" , 2008 International Symposium on Information Theory and Its Applications, 2008
[2] Kuei-Yi Chou, Yi-Ruei Chen, Wen-Guey Tzeng. "An efficient and secure group key man-agement scheme supporting frequent key updates on Pay-TV systems" , 2011 13th Asia-Pacific Network Operations and Management Symposium, 2011
[3] H. Lu. "A novel high-order tree for secure multicast key management" , IEEE Transactions on Computers, 2/2005
[4] H. Zhou, M. Zheng and T. Wang, “A Novel Group Key scheme for MANETS”, Advanced in control Engineering and Information Science, Procedia Engineering, IJSIA, 2011, pp. 3388-3395.
[5] S. Zhao, R. Kent and A. Aggarwal, “A Key Management and secure routing integrated framework for Ad-hoc Networks”, Ad-hoc Networks, Elsevier, vol-11, 2013, pp. 1046-1061
[6] Hanatani, Yoshikazu, et al. Secure Multicast Group Management and Key Distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing. 2016, pp. 227-243.
[7] S.K. Hafizul Islam, G.P. Biswas A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication J. King Saud Univ.-Comput. Inf. Sci., 29 (1) (2017), pp. 63-73
[8] Vinod Kumar, Rajendra Kumar, S.K. Pandey, "A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA pub-lic key cryptosystem", Journal of King Saud University - Computer and Information Sciences, 2018.
[9] Aparna S. Pande Y. V. Joshi, Manisha Y. Joshi, “Analysis on Logical Key Hierarchy and Variants for Secure Group Communication”, ICCASP 2018, Book chapter, Springer-Atalntis, AISR, ISSN 1951-6851.
[10] J. Goshi and R.E. Ladner, “Algorithms for Dynamic Multicast Key Distribution Trees,” Proc ACM Symp. Principles of Distributed Computing (PODC 2003), 2003.
[11] C. K. Wong, M. Gauda and S. S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, Vol.8, no.1, pp.16-30, 2000.
[12] P.Vijayakumar, S.Bose, A.Kannan, “Centralized key distribution protocol using the great-est common divisor method”, Computers and Mathematics with Applications , volume 65 1360–1368, 2013