Group Key Management Techniques

1
Sreeja Rajesh
Sreeja Rajesh
2
Mridula R D
Mridula R D
1 SCMS School of Engineering & Technology(SSET), Karukutty, Kerala.

Send Message

To: Author

GJCST Volume 13 Issue E11

Article Fingerprint

ReserarchID

CSTNWSD27LB

Group Key Management Techniques Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

The most widely used technique in a network is Group communication. This helps in the reduction of the bandwidth usage. The major concern in group communication is its security of messages. Group key provides security of messages and hence proper group key management is very important in a group communication. There are various classifications of group key management techniques. A survey of these key management techniques is done in this paper.

14 Cites in Articles

References

  1. H Harney,C Muckenhirn (1997). Group Key Management Protocol (GKMP) Architecture.
  2. H Chu,L Qiao,K Nahrstedt (2002). A Secure multicast Protocol with Copyright Protection.
  3. D Wallner,E Harder,R Agee (1999). Key Management for Multicast: Issues and Architectures.
  4. Melisa Hajyvahabzadeh,Elina Eidkhani,Seyedeh Mortazavi,Alireza Nemaney Pour (2010). A New Group Key Management Protocol Using Code for Key Calculation: CKC.
  5. G Chiou,W Chen (1989). Secure broadcast using the secure lock.
  6. D Mcgrew,A Sherman Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
  7. M Waldvogel,G Caronni,Dan Sun,N Weiler,B Plattner (1999). The VersaKey framework: versatile group key management.
  8. Suvo Mittra,Lolus (1997). Iolus.
  9. S Setia,S Koussih,S Jajodia,E Harder (2000). Kronos: a scalable group re-keying approach for secure multicast.
  10. & Rafaeli,Huchison (2002). Hydra: a decentralized group key management.
  11. B Briscoe (1999). Marks: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences.
  12. J Zhang,V Li,C Chen,P Tao,S Yang (2006). EDKAS: An Efficient Distributed Key Agreement Scheme Using One Way Function Trees for Dynamic Collaborative Groups.
  13. L Fan,D Xiao-Ping,L Qing-Kuan,Yan-Ming (2005). Distributed Group Key Distribution with Authentication Capability.
  14. Anahita Hs,Alireza Mortazavi,Toshihiko Nemaney Pour,Kato (2011). An Efficient Distributed Group Key Management using Hierarchical Approach with Diffie-Hellman and Symmetric Algorithm.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Sreeja Rajesh. 2013. \u201cGroup Key Management Techniques\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E11): .

Download Citation

Issue Cover
GJCST Volume 13 Issue E11
Pg. 21- 27
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

August 16, 2013

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9291
Total Downloads: 2396
2026 Trends
Research Identity (RIN)
Related Research

Published Article

The most widely used technique in a network is Group communication. This helps in the reduction of the bandwidth usage. The major concern in group communication is its security of messages. Group key provides security of messages and hence proper group key management is very important in a group communication. There are various classifications of group key management techniques. A survey of these key management techniques is done in this paper.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Group Key Management Techniques

Mridula R D
Mridula R D
Sreeja Rajesh
Sreeja Rajesh SCMS School of Engineering & Technology(SSET), Karukutty, Kerala.

Research Journals