By Topic

Reliable group rekeying with a customer perspective

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Onen, M. ; Inst. Eurecom, Sophia-Antipolis, France ; Molva, R.

Even though group rekeying is one of the most visited areas in network security, solutions still are severely lacking with respect to reliability and real customer expectations. We first classify secure multicast applications with regard to these expectations and suggest a new approach that defines different recipient categories based on their "loyalty" and that treats each category differently by offering better service to more loyal recipients. We propose to restructure the logical key hierarchy (LKH) scheme by separately regrouping members based on their membership duration, aiming at preserving members with long duration membership from the impact of rekeying operations caused by arrivals or departures of short-lived members. We then describe an extensive method for computing system parameters, like rekeying intervals, based on customer satisfaction criteria.

Published in:

Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE  (Volume:4 )

Date of Conference:

29 Nov.-3 Dec. 2004