An LKH Method Based on the Behavior of Group Members in Secure Multicast
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    LKH (logical key hierarchy) is a basic method in secure multicast group rekeying. LKH is efficient in real time group rekeying since it does not distinguish the different probability among the group members. However when members have diverse changing probability or different changing modes, the gap between LKH and the optimal algorithm will become bigger. If the probabilities of members have been known, LKH can be improved someway, but the changing probability of members can not be known exactly. Based on the basic knowledge of group members, in R-LKH (Refined-LKH), the active members and inactive members are partitioned and set on different locations in the logical key tree firstly. Then the concept “dirty path” is introduced in order to reduce the repeated rekeying overhead in the same path. All these can decrease the number of encryption in group manager and the network communication overhead. The simulation result indicate that R-LKH has a better improvement over LKH if the multicast group members’ behavior could be distinguished “approximately”.

    Reference
    Related
    Cited by
Get Citation

许勇,陈恺.安全多播中基于成员行为的LKH方法.软件学报,2005,16(4):601-608

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:November 25,2003
  • Revised:April 01,2004
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063