Secure Multicast Transmission Scheme for Overlay Networks
||International Journal of Computer & Organization Trends (IJCOT)|
|© 2014 by IJCOT Journal|
|Volume - 4 Issue - 5
|Year of Publication : 2014|
|Authors : K.Pavya|
|DOI : 10.14445/22492593/IJCOT-V12P306|
K.Pavya. "Secure Multicast Transmission Scheme for Overlay Networks", International Journal of Computer & organization Trends (IJCOT), V4(5):19-24 Sep - Oct 2014, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Secure multicast transmission schemes are used to transfer data to a set of nodes. Membership in secure multicast groups is dynamic and requires multiple updates in a single time frame. Storage cost and rekeying cost are considered in the secure multicast transmission. The system manages long standing members and shortly lived members separately. Long standing members need to store smaller number of keys than short-lived members. The system manages variable storage levels for key management. Hierarchical key management algorithm is used to manage group key values. The RSA and Advanced Encryption Standard (AES) algorithms are used for the communication security. The system manages membership addition and removes operations. The key management scheme is not optimized for overlay networks, End node based multicast transmission is not optimized, Traffic overhead is high and Transmission and listen mode energy levels are not managed problems are identified from the existing security models. The secure multicast transmission supports key management under multicast groups. The storage and key revocation operations are managed by the system. The system is enhanced to manage keys under overlay networks. The traffic and energy control mechanisms are integrated with the system. The system is designed to manage storage and key revocation process. Multicast group and key management operations are integrated in the system. The system is enhanced to manage group keys under overlay network environment. The key management messages are controlled in the system.
1. Dennis Campbell and Center for International Legal Studies “Solutions for Denial of Service Attacks” Publisher: Oxford University Press, USA 2005.
2. Niels Ferguson and Bruce Schneier, “Overlay Networks”, Publisher: Wiley, 2003.
3. Sudip Misra, Isaac Woungang and Subhas Chandra Misra ‘Guide to Wireless Ad Hoc Networks (Computer Communications and Networks)’, Publisher: Springer, 2009.
4. Wenbo Mao “AES algorithm” Publisher: Prentice Hall PTR; 1st edition 2003.
5. Y.-H. Chu, S.G. Rao, S. Seshan, and H. Zhang, “A Case for End System Multicast,” IEEE J. Selected Areas in Comm., vol. 20, no. 8, pp. 1456-1471, Oct. 2002.
6. F. Zhu, A. Chan, and G. Noubir, “Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast,” Proc. Military Comm. Conf. (MILCOM), 2003.
multicast transmission, key revocation, Group key exchange, Overlay network, Advanced Encryption Standard