Please use this identifier to cite or link to this item:
Title: Investigations on an optimized key management system for secure multicast communication
Researcher: Joe Prathap P. M.
Guide(s): Vasudevan, V.
Keywords: Key management system, multicast communication, ezclusion basis system, partially full maximum height tree, multiple edge sharing tree, mobile ad hoc NETworks
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 
Abstract: Multicasting is a type of communication between computers in a network, that enables a computer to send one stream of data to many interested receivers without interrupting computers that are not interested. In this thesis, we study the efficiency versus security requirements and tradeoffs in group key management for multicast communication. Efficiency is in terms of minimizing the group rekeying cost, the key storage cost and transmission cost, while security is in terms of achieving backward secrecy, forward secrecy, and resistance to collusion. This work considers one of the most challenging features of multicast deployment: an effective secure key management. In essence, the thesis summarizes the important existing key management algorithms available for use in multicast networks, and studies the weaknesses of the current schemes. A combinatorial based optimization technique Exclusion Basis System (EBS) was developed, which produces optimal results based on the size of the group, the number of keys stored by each member, and the number of rekey messages. A refined decentralized contributory key management technique was proposed, which reduces the rekeying cost of the multicast network. With the help of a Partially Full Maximum Height Tree (PFMH), a Tree-based Contributory Group Key Agreement (PACK) protocol with an optimal communication cost as well as computation cost was achieved. More secure and faster multicast content distribution was achieved by using the Multiple Edge Sharing Tree (MEST) tree construction. It is used to balance the resource allocation especially in Mobile Ad hoc NETworks (MANET). The overall results of the analytical evaluation show that our scheme allows a fine-tuning of security versus efficiency requirements at runtime, which is not possible with the previous group key management schemes. The solutions are actually application-specific ones. Based on the need of applications, the proposed solutions are selected and they can be used to achieve better results. newline newline newline
Pagination: xxv, 236
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.65 kBAdobe PDFView/Open
02_certificates.pdf1.05 MBAdobe PDFView/Open
03_abstract.pdf16.95 kBAdobe PDFView/Open
04_acknowledgement.pdf14.88 kBAdobe PDFView/Open
05_contents.pdf65.71 kBAdobe PDFView/Open
06_chapter 1.pdf280.59 kBAdobe PDFView/Open
07_chapter 2.pdf251.69 kBAdobe PDFView/Open
08_chapter 3.pdf145.44 kBAdobe PDFView/Open
09_chapter 4.pdf131.18 kBAdobe PDFView/Open
10_chapter 5.pdf839.43 kBAdobe PDFView/Open
11_chapter 6.pdf1.66 MBAdobe PDFView/Open
12_chapter 7.pdf425.35 kBAdobe PDFView/Open
13_chapter 8.pdf149.77 kBAdobe PDFView/Open
14_chapter 9.pdf19.76 kBAdobe PDFView/Open
15_references.pdf43.62 kBAdobe PDFView/Open
16_publications.pdf17.07 kBAdobe PDFView/Open
17_vitae.pdf11.6 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.