期刊文献+

一种LKH组播密钥树的启发式构建方法 被引量:2

Heuristic construction method of LKH multicast key tree
下载PDF
导出
摘要 LKH(logical key hierarchy)方法是一种有效的组播密钥更新技术。但在密钥更新过程中,该方法的加密开销与传输开销往往成为通信系统的瓶颈。通过对上述问题的研究,给出了最优密钥树结构的定义,并提出一种构建最优密钥树的启发式搜索算法。与传统LKH密钥树结构相比,最优树的不同层具有不同的分支数,因此其可降低密钥更新过程中的处理开销。理论分析与仿真实验均表明,所提方案可有效降低系统组播密钥更新的加密开销、传输开销及密钥存储量。 LKH method is an efficient multicast key update technology. But during the rekey process in this method, encryp- tion and transmission overhead often become a bottleneck in the communication system. Through the study of the above issue, this paper developed a heuristic search algorithm to construct an optimal key tree structure. Different from the traditional LKH key tree structure, the branching factor of this approach could take on different values at each level of tree, so the new struc- ture could reduce the rekey overhead. The experimental results show that the scheme can efficiently reduce the eneryption overhead, transmission overlhead and the storage of keys in the system during the rekey process.
出处 《计算机应用研究》 CSCD 北大核心 2016年第8期2413-2416,共4页 Application Research of Computers
关键词 组播通信 逻辑密钥树 启发式搜索 估值函数 分支因子 multicast communication logical key tree heuristic search estimate function branch factor
  • 相关文献

参考文献15

  • 1Bergadano F. Issues in muhicast security [ C ]//Lecture Notes in Computer Science. 2000 : 119-139.
  • 2Wallner D M, Harder E C, Agee R C. RFC 2627,Key management for muhicast : issues and architectures[ S ]. 1998.
  • 3徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 4Ren Kui, Zeng Kai, Lou Wenjing. A new approach for random key pre-distribution in large-scale wireless sensor networks[ J ]. Wireless Communications and Mobile Computing,2006,6(3) :307-318.
  • 5Varalakshmi R, Uthariaraj V R. Huddle hierarchy based group key management protocol using gray code [ J ]. Wireless Networks, 2014,20(4) :695-704.
  • 6Kim J M, Cho T H. Location-based key management structure for se- cure group communication in wireless sensor networks [ J ]. IEICE Trans on Communications,2013, E96-B(9 ) :2183-2189.
  • 7Pushpalatha K, Chitra M. GAMANET:a ganatic algorithm approach for hierarchical group key management in mobile Ad hoc network [ C ]//Proc of International Conference on Pattern Recognition, Infor- matics and Mobile Engineering. [ S. 1. ] : IEEE Press, 2013 : 368- 373.
  • 8Srivatsa M, Iyengar A, Yin Jian, et al. Scalable key management al- gorithms for location-based services[ J]. IEEE/ACM Trans on Net- working, 2009,17 ( 5 ) : 1399 - 1412.
  • 9Sakamoto T, Tsuji T, Kaji Y. Group key rekeying using the LKH technique and the Huffman algorithm [ C ]//Proe of International Symposium on Information Theory and Its Applications. 2008:1-6.
  • 10Oliveira L B, Aranha D F, Gouv6a C P L, et al. TinyPBC:pairings for authenticated identity-based non-interactive key distribution in sensor networks [ J ]. Computer Communications, 2011,34 ( 3 ) : 485-493.

二级参考文献15

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献65

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部