BURSTY OPERATION IN SCALABLE KEY MANAGEMENT PROTOCOLS

Fatma A. Omara, Sherief I. Zaki, Mohamed W. Abo El-soud

Abstract


In order to offer secrecy for multicast applications, the traffic encryption key has to be changed
whenever a user joins or leaves the system. Such a change has to be communicated to all the
current users. The used bandwidth for such re-keying operation could be high when the group
size is large. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management
(ASGK). According to ASGK protocol, the multicast group is divided into clusters,
where each cluster consists of subgroups of members. Each cluster uses its own Traffic Encryption
Key (TEK). These clusters are updated periodically depending on the dynamism of
the members during the secure session. The modified protocol has been proposed based on
ASGK which is called a New Protocol for Scalable Key Management (NPSM). The main challenge
of the developed solution is that how to perform a bursty operation in one aggregate operation
to reduce the number of re-keying messages for cluster, reduce the frequency of key
distributions, increase the scalability of the key distribution protocol and reduce the network
traffic.

Refbacks

  • There are currently no refbacks.