Nothing Special   »   [go: up one dir, main page]

Skip to main content

Approximation Algorithms for Key Management in Secure Multicast

  • Conference paper
Computing and Combinatorics (COCOON 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5609))

Included in the following conference series:

  • 998 Accesses

Abstract

Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership changes. We consider the problem of determining a key hierarchy that minimizes the average communication cost of an update, given update frequencies of the group members and an edge-weighted undirected graph that captures routing costs. We first present a polynomial-time approximation scheme for minimizing the average number of multicast messages needed for an update. We next show that when routing costs are considered, the problem is NP-hard even when the underlying routing network is a tree network or even when every group member has the same update frequency. Our main result is a polynomial time constant-factor approximation algorithm for the general case where the routing network is an arbitrary weighted graph and group members have nonuniform update frequencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Awerbuch, B., Baratz, A.E., Peleg, D.: Cost-Sensitive Analysis of Communication Protocols. In: PODC (1990)

    Google Scholar 

  2. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: INFOCOMM (1999)

    Google Scholar 

  3. Canetti, R., Malkin, T.G., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–470. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient Security for Large and Dynamic Multicast Groups. In: WETICE (1998)

    Google Scholar 

  5. Chan, A., Rajaraman, R., Sun, Z., Zhu, F.: Approximation Algorithms for Key Management in Secure Multicast, arXiv:0904.4061v1 [cs.DS] (2009)

    Google Scholar 

  6. Golin, M.J., Kenyon, C., Young, N.E.: Huffman coding with unequal letter costs. In: STOC (2002)

    Google Scholar 

  7. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture. Internet RFC 2094 (1997)

    Google Scholar 

  8. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. Internet RFC 2093 (1997)

    Google Scholar 

  9. Heeringa, B.: Improving Access to Organized Information. Thesis, University of Massachussetts, Amherst (2008)

    Google Scholar 

  10. Heeringa, B., Adler, M.: Optimal website design with the constrained subtree selection problem. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 757–769. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Huffman, D.: A Method for the Construction of Minimum-Redundancy Codes. In: IRE (1952)

    Google Scholar 

  12. Karp, R.: Minimum-redundancy coding for the discrete noiseless channel. In: IRE Transactions on Information Theory (1961)

    Google Scholar 

  13. Khuller, S., Kim, Y.A.: Broadcasting in Heterogeneous Networks. Algorithmica 14(1), 1–21 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. Khuller, S., Raghavachari, B., Young, N.E.: Balancing Minimum Spanning Trees and Shortest-Path Trees. Algorithmica 14(4), 305–321 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  15. Kortsarz, G., Peleg, D.: Approximating Shallow-Light Trees (Extended Abstract). In: SODA (1997)

    Google Scholar 

  16. Lazos, L., Poovendran, R.: Cross-layer design for energy-efficient secure multicast communications in ad hoc networks. In: IEEE Int. Conf. Communications (2004)

    Google Scholar 

  17. Liu, P.: Broadcast Scheduling Optimization for Heterogeneous Cluster Systems. J. Algorithms 42(1), 135–152 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  18. Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: SIGCOMM (1997)

    Google Scholar 

  19. Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. In: IEEE Transactions on Information Theory (2001)

    Google Scholar 

  20. Salido, J., Lazos, L., Poovendran, R.: Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. In: IEEE/ACM Trans. Netw. (2007)

    Google Scholar 

  21. Shields, C., Garcia-Luna-Aceves, J.J.: KHIP—a scalable protocol for secure multicast routing. In: SIGCOMM (1999)

    Google Scholar 

  22. Snoeyink, J., Suri, S., Varghese, G.: A Lower Bound for Multicast Key Distribution. In: IEEE Infocomm (2001)

    Google Scholar 

  23. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. Internet RFC 2627 (1999)

    Google Scholar 

  24. Wong, C.K., Gouda, M.G., Lam, S.S.: Secure Group Communications Using Key Graphs. In: SIGCOMM (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chan, A., Rajaraman, R., Sun, Z., Zhu, F. (2009). Approximation Algorithms for Key Management in Secure Multicast. In: Ngo, H.Q. (eds) Computing and Combinatorics. COCOON 2009. Lecture Notes in Computer Science, vol 5609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02882-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02882-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02881-6

  • Online ISBN: 978-3-642-02882-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics