Chinese remainder Theorem based centralised group key management for secure multicast communication

2014 ◽  
Vol 8 (3) ◽  
pp. 179-187 ◽  
Author(s):  
Pandi Vijayakumar ◽  
Arputharaj Kannan ◽  
Sudan Bose
Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3930 ◽  
Author(s):  
Haowen Tan ◽  
Ilyong Chung

The wireless body area network (WBAN) is considered as one of the emerging wireless techniques in the healthcare system. Typical WBAN sensors, especially implantable sensors, have limited power capability, which restricts their wide applications in the medical environment. In addition, it is necessary for the healthcare center (HC) to broadcast significant notifications to different patient groups. Considering the above issues, in this paper, the novel practical WBAN system model with group message broadcasting is built. Subsequently, a secure and efficient group key management protocol with cooperative sensor association is proposed. In the proposed protocol, the Chinese remainder theorem (CRT) is employed for group key management between HC and the personal controller (PC), which also supports batch key updating. The proposed sensor association scheme is motivated by coded cooperative data exchange (CCDE). The formal security proofs are presented, indicating that the proposed protocol can achieve the desired security properties. Moreover, performance analysis demonstrates that the proposed protocol is efficient compared with state-of-the-art group key management protocols.


Processes ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 1300
Author(s):  
Mai Trung Dong ◽  
Haitao Xu

In group key management, the implementation of encryption often fails because multicast communication does not provide reliable linkage. In this paper, a new group key management scheme is proposed for multicast communication in fog computing networks. In the proposed scheme, any legal fog user belonging to a fog node will be able to decrypt a ciphertext encrypted by a secret shared key. The shared secret key is divided into key segments. In the rekeying operation process, each key segment is split into two factors with its shared production mechanism. The key updates are required to belong to the fog provider or the group management device. Fog users will have independent key segments unchanged. Then, the cost, the message of rekeying, and the dependence on credible channels will be decreased. This method can resist collusion attacks and ensure backward security and forward security, even if the number of users leaving is larger than the threshold value. Our scheme is also suitable for untrusted affiliate networks.


2019 ◽  
Vol 8 (2) ◽  
pp. 2317-2328

The most appropriate communication mechanism for transfer of packets from one source to another is multicast IPv6 communication. Nowadays, multicast communication plays a major role in a large number of communication applications. In this multicast communication, the message privacy attains a highest position. The members of multicast are dynamic so they permit the host members to enter and depart the cluster without the permission of remaining group members and, it can't provide any transfer without the interference of host, this may reduce the performance. For security enhancement in multicast communication Group Key Management (GKM) was introduced. There are three different approaches in GKM and they were mainly involved to overcome the issues of host mobility in multicast communication. The challenges that are encountered by these GKM approaches their requirements and challenges was also discussed in this paper. Finally, some questions and their explanations were provided along with it. These GKM approaches will improve the privacy of multicast communication. So, the packets can deliver to the group members without any interference.


Sign in / Sign up

Export Citation Format

Share Document