SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 36-40
www.iosrjournals.org
www.iosrjournals.org 36 | Page
A Novel High Order Tree for Securing Key Management for
Multicast Services
M.Latha1
, Mrs.S.Nalini2
,
1.M.E (CSE), Department of Computer science & Engg,University College of Engineering,BIT Campus, Trichy,
2.Asst. Professor, Department of Computer Applications, University College of Engineering,BIT Campus Trichy
Abstract: With the emergence of diverse group-based services, multiple multicast groups are likely to co-exist
in a single network,and users may subscribe to multiple groups simultaneously. However, the existing group key
management (GKM) schemes, aiming to secure communication within a single group, are not suitable in
multiple multicast group environments because of inefficient use of keys, and much larger rekeying overheads.
In this paper, we propose a new group key management scheme for multiple multicast groups, called the
master-key-encryption-based multiple group key management (MKE-MGKM) scheme. The MKE-MGKM
scheme exploits asymmetric keys, i.e., a master key and multiple slave keys, which are generated from the
proposed master key encryption(MKE) algorithm, and is used for efficient distribution of the group key. It
alleviates the rekeying overhead by using the asymmetry of the master and slave keys, i.e., even if one of the
slave keys is updated, the remaining ones can still be unchanged by modifying only the master key. Through
numerical analysis and simulations, it is shown that the MKE-MGKM scheme can reduce the storage overhead
of a key distribution center (KDC) by 75% and the storage overhead of a user by up to 85%, and 60% of the
communication overhead at most, compared to the existing schemes.
Index Terms: Security, group Key Management, multicast, chinese remainder theorem, master key encryption
I. INTRODUCTION
Objective of the project
The multicast group can be identified with the class D IP address so that the members can enter or
leave the group with the management of Internet group management protocol. The trusted model gives a scope
between the entities in a multicast security system. For secure group communication in the multicast network, a
group key shared by all group members is required. This group key should be updated when there are
membership changes in the group, such as when a new member joins or a current member leaves. Along with
these considerations, we take the help relatively prime numbers and their enhancements that play a vital role in
the construction of keys that enhances the strength for the security. Multicast cryptosystems are preferably for
sending the messages to a specific group of members in the multicast group.
Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all the
members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet. The
Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and
networks triples approximately every two years. Also Internet traffic is doubling every three months partly
because of the increased users, but also because of the introduction of new multicast applications in the real
world such as video conferencing, games, atm applications etc.. Broad casting such as www, multimedia
conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a
flexible multicasting capability. Multicast is a relatively new form of communications where a single packet is
transmitted to more than one receivers. The Internet does not manage the multicast group membership tightly. A
multicast message is sent from a source to a group of destination hosts. A source sends a packet to a multicast
group specifying as the multicast group address. The packet is automatically duplicated at intermediate routers
and any hosts that joined the group can receive a copy of the packet. Because a host can receive transmitted data
of any multicast groups, secure communications is more important in multicasting than in unicasting.
II. Multicast
In computer networking, multicast is the delivery of a message or information to a group of destination
computers simultaneously in a single transmission from the source. Copies are automatically created in other
network elements, such as routers, but only when the topology of the network requires it.
Multicast is most commonly implemented in IP multicast, which is often employed in Internet Protocol
(IP) applications of streaming media and Internet television. In IP multicast the implementation of the multicast
concept occurs at the IP routing level, where routers create optimal distribution paths for data grams sent to a
multicast destination address.
A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 37 | Page
2.2.GroupKey Management in Multicast Security
Multicast technology is used for distributing data to a group of participants by conserving bandwidth more
efficiently than traditional unicast mechanism. This is done by replicating IP streams in the router at the same
time thus achieving better delivery to multiple users. This would mean conservation of computational resources
of the sender and bandwidth efficiency in the network. A group membership can be performed using the
Internet Group Multicast Protocol (IGMP) protocol. It provides admission control operation such as "join" and
"leave". Some examples of applications that take advantage of multicast technology are video conferencing,
digital broadcasting, software distribution and electronic learning
2.3. A Group Key Management Approach For Multicast Cryptosystems
Multicast cryptosystems are preferably for sending the messages to a specific group of members in the
multicast group. Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all
the members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet.
The Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and
networks triples approximately every two years. Also Internet traffic is doubling every three months partly
because of the increased users, but also because of the introduction of new multicast applications in the real
world such as video conferencing, games, ATM applications etc. broad casting such as www, multimedia
conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a
flexible multicasting capability.
Multicast is a relatively new form of communications where a single packet is transmitted to more than
one receivers. The Internet does not manage the multicast group membership tightly. A multicast message is
sent from a source to a group of destination hosts. A source sends a packet to a multicast group specifying as the
multicast group address. The packet is automatically duplicated at intermediate routers and any hosts that joined
the group can receive a copy of the packet. Because a host can receive transmitted data of any multicast groups,
secure communications is more important in multicasting than in unicasting.
The security in the multicast communication in the large groups is the major obstacles for effectively
controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to
control the intruders in the group communication. Group key management is mainly addresses upon the trust
model developed by Group Key Management Protocol (GKMP). There are several group key management
protocols that are proposed, this paper will however elaborate mainly on Group key management which has a
sound scalability when compared with other central key management systems. This paper emphases protocol
which provides a scope for the dynamic group operations like join the group, leave the group, merge without the
need of central mechanisms. An important component for protecting group secrecy is re-keying. With the
combination of strong public and private key algorithms this would become a better serve to the multicast
security.
Multicast routing protocols provide resilience against collaborating malicious nodes. PGKMP is a
complete multipath protocol, in the sense that it provides the maximum security in the network when compared
to the existing protocols like LKH etc. The security of PGKMP is mainly based on neighborhood authentication
of the nodes, as well as on security associations, while the use of public key cryptography is minimized. The
PGKMP protocol can be integrated on top of existing on-demand routing protocols such as LKH. A key reason
for this good performance is the fact that PGKMP operates entirely on-demand with no periodic activity of any
kind required within the network. PGKMP finds disjoint paths only, so the route discovery cost will be less as
compared to LKH where all possible paths exist and a key server has to be maintained. Also due to the double
encryption scheme provided to the protocol, the network is more secured. There is a scope to further decrease
the overheads and increase more security with this Protocol (PGKMP) and a positive hope for the enhancement
of this protocol.
III. Existing System
The existing GKM schemes still face the limitation of rekeying performance as the number of multicast
services increases. However, in the foreseeable future, multiple multicast groups will co-exist in a single
network due to the emergence of many group-based applications. In such a situation, it is likely that the service
provider may suffer from considerable key management overhead for supporting multiple multicast groups. In
existing system if the user wants to access from different server the user have to login each time for different
server hence the key management process become too tedious to handle if the server number increases
tremendously Once the master key has been change the entire configuration has to be configured to access the
service.
A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 38 | Page
Disadvantages
 Rekeying management is too difficult to handle.
 If any changes in the network configuration mean
the entire key system has to be modified.
 Group key management has limitation in managing the key.
IV. Proposed System
A new multiple group key management (MGKM) scheme, named the master-key-encryption based
MGKM (MKE-MGKM) scheme,which can reduce the rekeying overhead from managing multiple group keys.
The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master key
encryption (MKE), to enhance the rekeying performance by alleviating the rekeying overhead. Compared with
the MGKM schemes expanding the existing GKM schemes, the MKE-MGKM scheme can reduce the storage
overhead of a key distribution center (KDC) by 75%. Hence this has been implemented for multicast service
like video streaming and downloading to avoid the pirated movies and to avoid unauthorized users to view and
download the videos in video service websites.
Advantages
 Efficient key management process.
 No limitation in rekeying process.
 Storage resource has been reduced.
 Used in third-party data storage system.
V. Problem Definition
The existing GKM schemes targeted to a single multicast group are not directly applicable to the
multiple multicast service environments. If each multicast group is managed by its own GKM scheme according
to the existing GKM schemes, more independent multicast groups would be required. In this case, when a user
subscribing to the multiple multicast services stops subscribing to all the services, all these multicast groups
independently initiate the rekeying procedure, which may result in much more rekeying overhead. To alleviate
the problem of unauthorized video watching and recording from sites.
VI. Experimental Results
MODULE DESCRIPTION
1. Multicast Service Module
2. Traffic Encryption key Generation
3. MKE based MGKM algorithm
4. Rekey Management.
5. Video layer coding
6.1. Multicast Service module
In order to implement the multicast, i.e., the delivery of data only to the members of a group, in
wireless networks, we need to an access control mechanism for the broadcasted messages, which guarantees
confidentiality, protects digital contents, and facilitates accurate accounting.
FIG.6.1
6.2. Traffic Encryption key Generation
All these keys comprise a logical key tree, where the TEK is the root node, an IK is a leaf node, and
the KEKs are the rest of the nodes in the key tree. It can significantly reduce the amount of rekeying overhead
which is a logarithmic function of a group size.
A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 39 | Page
FIG.6.2
6.3. MKE based MGKM algorithm
The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master
key encryption (MKE), to enhance the rekeying performance.
Key distribution
FIG.6.3
6.4. Rekey Management
A rekeying mechanism for multiple groups by introducing a MKE-based key graph having the master
and slave keys. Rekeying can significantly increase due to the number of multiple groups.
6.5.Video layer coding
To deliver high quality video services, it becomes vital to consider the heterogeneous wireless
infrastructure and multi-radio capability of mobile devices.
FIG.6.4
VII. Conclusion And Future Work
The key graph of the MKE-MGKM scheme is much simpler than that of other schemes; less memory is
needed for storing the keys. Compared with other schemes, the MKE-MGKM scheme can significantly reduce
the storage and communication overheads in the rekeying process, with acceptable computational overhead. It is
expected that the MKEMGKM scheme can be a practical solution for various group applications, especially for
those requiring many service groups, such as TV streaming services charged on a channel by channel basis.
In future the concept can be applied for video broadcasting service to avoid unauthorized users to view
and access the video.
TEK
IK 1 IK 2 IK n
Data Encrypt
Master Key
Number of slave key generation Group control and key
server
Compromised key list
Video file Time Slot Allocation
Providing Authorization to
Authenticated users
Rearrangement of Timeslot
dynamically
Video Encoding
Authorized
user/Decoding
Blocked unauthorized user by Genetic
algorithm implementation
A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 40 | Page
References
[1] Lawrence Horte “Introduction to data multicasting”, 2008
[2] Zhang, J, Varadharajan, V and Mu, Y,” A novel dynamic key management scheme for secure multicasting,” ICON2003. The 11th
IEEE International Conference on Network
[3] C. K. Wong, M. G. Gouda, and S. S. Lam, “Secure group communications using key graphs,” 1998.
[4] H. Lu, “A novel high-order tree for secure multicast key management”, IEEE Transactions on Computers, vol. 54, 2005.
[5] Y. Challal and H. Seba, “Group key management protocols: A novel taxonomy,” International Journal of Information
Technology,vol. 2, no. 1, pp. 105–118, 2005.
[6] Sherman and McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEETSE: IEEE Transactions on
Software Engineering, vol. 29, 2003.
[7] J.-C.Lin, F. Lai, and H.-C. Lee, “Efficient group key management protocol with one-way key derivation,” in LCN. IEEE Computer
Society, 2005, pp. 336–343. [Online].Available:http://doi.ieeecomputersociety.org/10.1109/LCN.2005.61
[8] Y. Sun and K. J. R. Liu, “Hierarchical group access control for secure multicast communications,” IEEE/ACM Trans. Netw, vol. 15,
no. 6, pp. 1514–1526, 2007.
[9] Q. Zhang and Y. Wang, “A centralized key management scheme for hierarchical access control,” in IEEE Globecom. IEEE
Communication Society, 2004, pp. 2067–2071.
[10] D. WALLNER, E. HARDER, , and R. AGEE, “Key management for multicast: Issues and architectures,” IETF, Request For
Comments 2627, 1999.
[11] R. L.Rivest, A.Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications
of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[12] K. Koyama, “A master key for the RSA public-key cryptosystem,”Systems-Comput.-Controls, vol. 13, no. 1, pp. 63–70 (1983), 1982.
[13] A. Kondracki, “The chinese remainder theorem,” Formalized Mathematics,vol. 6, no. 4, pp. 573–577, 1997.
[14] L. R. YU and L. B. LUO, “The Generalization of the Chinese Remainder Theorem,” Springer Acta Mathematica Sinica, vol. 18,no.
3, pp. 531–538, 2002.
[15] X. Zou, B. Ramamurthy, and S. S. Magliveras, “Chinese remainder theorem based hierarchical access control for secure group
communication,” Lecture Notes in Computer Science, vol. 2229, pp 381–385, 2001.
[16] X. Zheng, C.-T. Huang, and M. M. Matthews, “Chinese remainder theorem based group key management,” in ACM Southeast
Regional Conference, D. John and S. N. Kerr, Eds. ACM, 2007, pp 266–271.

More Related Content

What's hot

Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Editor IJCATR
 
B018140813
B018140813B018140813
B018140813
IOSR Journals
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
eSAT Publishing House
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
IOSR Journals
 
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
IJERD Editor
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
ijiert bestjournal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
IJNSA Journal
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
IJNSA Journal
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
Chong Yee Er
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeer
IJCI JOURNAL
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
H0362052056
H0362052056H0362052056
H0362052056
inventionjournals
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 

What's hot (20)

Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
 
B018140813
B018140813B018140813
B018140813
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
TAM new report
TAM new reportTAM new report
TAM new report
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Internet 2.0
Internet 2.0Internet 2.0
Internet 2.0
 
A study of index poisoning in peer topeer
A study of index poisoning in peer topeerA study of index poisoning in peer topeer
A study of index poisoning in peer topeer
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
IJCA
IJCAIJCA
IJCA
 
H0362052056
H0362052056H0362052056
H0362052056
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 

Viewers also liked

Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
IOSR Journals
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditikllopezy
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
IOSR Journals
 
5 tips for perfect presentations
5 tips for perfect presentations5 tips for perfect presentations
5 tips for perfect presentations
Bernd Allgeier
 
Making Use of the Linked Data Cloud: The Role of Index Structures
Making Use of the Linked Data Cloud: The Role of Index StructuresMaking Use of the Linked Data Cloud: The Role of Index Structures
Making Use of the Linked Data Cloud: The Role of Index Structures
Thomas Gottron
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
IOSR Journals
 
Manual maestro construcor
Manual maestro construcorManual maestro construcor
Manual maestro construcor
Juan Gabriel Farfán Yovera
 
B0160709
B0160709B0160709
B0160709
IOSR Journals
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
IOSR Journals
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
IOSR Journals
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на днеNatalya Dyrda
 
The Look Noviembre Diciembre 2012
The Look Noviembre Diciembre 2012The Look Noviembre Diciembre 2012
The Look Noviembre Diciembre 2012
MaryKayPuebla
 
Voltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement FactorVoltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement Factor
IOSR Journals
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 

Viewers also liked (20)

Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditik
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
 
OFIPA
OFIPAOFIPA
OFIPA
 
5 tips for perfect presentations
5 tips for perfect presentations5 tips for perfect presentations
5 tips for perfect presentations
 
Thanhham
ThanhhamThanhham
Thanhham
 
Making Use of the Linked Data Cloud: The Role of Index Structures
Making Use of the Linked Data Cloud: The Role of Index StructuresMaking Use of the Linked Data Cloud: The Role of Index Structures
Making Use of the Linked Data Cloud: The Role of Index Structures
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Manual maestro construcor
Manual maestro construcorManual maestro construcor
Manual maestro construcor
 
B0160709
B0160709B0160709
B0160709
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на дне
 
The Look Noviembre Diciembre 2012
The Look Noviembre Diciembre 2012The Look Noviembre Diciembre 2012
The Look Noviembre Diciembre 2012
 
Voltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement FactorVoltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement Factor
 
Custom keys
Custom keysCustom keys
Custom keys
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 

Similar to A Novel High Order Tree for Securing Key Management for Multicast Services

Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
ijtsrd
 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
Association of Scientists, Developers and Faculties
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
CSCJournals
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSenetas
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
JPINFOTECH JAYAPRAKASH
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
Tal Lavian Ph.D.
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
ijp2p
 
efficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensingefficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensing
swathi78
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
IEEEBEBTECHSTUDENTSPROJECTS
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
chennaijp
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
graphhoc
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET Journal
 

Similar to A Novel High Order Tree for Securing Key Management for Multicast Services (20)

Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmission
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
231 236
231 236231 236
231 236
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
efficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensingefficient and privacy aware data aggregation in mobile sensing
efficient and privacy aware data aggregation in mobile sensing
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

A Novel High Order Tree for Securing Key Management for Multicast Services

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 36-40 www.iosrjournals.org www.iosrjournals.org 36 | Page A Novel High Order Tree for Securing Key Management for Multicast Services M.Latha1 , Mrs.S.Nalini2 , 1.M.E (CSE), Department of Computer science & Engg,University College of Engineering,BIT Campus, Trichy, 2.Asst. Professor, Department of Computer Applications, University College of Engineering,BIT Campus Trichy Abstract: With the emergence of diverse group-based services, multiple multicast groups are likely to co-exist in a single network,and users may subscribe to multiple groups simultaneously. However, the existing group key management (GKM) schemes, aiming to secure communication within a single group, are not suitable in multiple multicast group environments because of inefficient use of keys, and much larger rekeying overheads. In this paper, we propose a new group key management scheme for multiple multicast groups, called the master-key-encryption-based multiple group key management (MKE-MGKM) scheme. The MKE-MGKM scheme exploits asymmetric keys, i.e., a master key and multiple slave keys, which are generated from the proposed master key encryption(MKE) algorithm, and is used for efficient distribution of the group key. It alleviates the rekeying overhead by using the asymmetry of the master and slave keys, i.e., even if one of the slave keys is updated, the remaining ones can still be unchanged by modifying only the master key. Through numerical analysis and simulations, it is shown that the MKE-MGKM scheme can reduce the storage overhead of a key distribution center (KDC) by 75% and the storage overhead of a user by up to 85%, and 60% of the communication overhead at most, compared to the existing schemes. Index Terms: Security, group Key Management, multicast, chinese remainder theorem, master key encryption I. INTRODUCTION Objective of the project The multicast group can be identified with the class D IP address so that the members can enter or leave the group with the management of Internet group management protocol. The trusted model gives a scope between the entities in a multicast security system. For secure group communication in the multicast network, a group key shared by all group members is required. This group key should be updated when there are membership changes in the group, such as when a new member joins or a current member leaves. Along with these considerations, we take the help relatively prime numbers and their enhancements that play a vital role in the construction of keys that enhances the strength for the security. Multicast cryptosystems are preferably for sending the messages to a specific group of members in the multicast group. Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all the members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet. The Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and networks triples approximately every two years. Also Internet traffic is doubling every three months partly because of the increased users, but also because of the introduction of new multicast applications in the real world such as video conferencing, games, atm applications etc.. Broad casting such as www, multimedia conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a flexible multicasting capability. Multicast is a relatively new form of communications where a single packet is transmitted to more than one receivers. The Internet does not manage the multicast group membership tightly. A multicast message is sent from a source to a group of destination hosts. A source sends a packet to a multicast group specifying as the multicast group address. The packet is automatically duplicated at intermediate routers and any hosts that joined the group can receive a copy of the packet. Because a host can receive transmitted data of any multicast groups, secure communications is more important in multicasting than in unicasting. II. Multicast In computer networking, multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source. Copies are automatically created in other network elements, such as routers, but only when the topology of the network requires it. Multicast is most commonly implemented in IP multicast, which is often employed in Internet Protocol (IP) applications of streaming media and Internet television. In IP multicast the implementation of the multicast concept occurs at the IP routing level, where routers create optimal distribution paths for data grams sent to a multicast destination address.
  • 2. A Novel High Order Tree for Securing Key Management for Multicast Services www.iosrjournals.org 37 | Page 2.2.GroupKey Management in Multicast Security Multicast technology is used for distributing data to a group of participants by conserving bandwidth more efficiently than traditional unicast mechanism. This is done by replicating IP streams in the router at the same time thus achieving better delivery to multiple users. This would mean conservation of computational resources of the sender and bandwidth efficiency in the network. A group membership can be performed using the Internet Group Multicast Protocol (IGMP) protocol. It provides admission control operation such as "join" and "leave". Some examples of applications that take advantage of multicast technology are video conferencing, digital broadcasting, software distribution and electronic learning 2.3. A Group Key Management Approach For Multicast Cryptosystems Multicast cryptosystems are preferably for sending the messages to a specific group of members in the multicast group. Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all the members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet. The Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and networks triples approximately every two years. Also Internet traffic is doubling every three months partly because of the increased users, but also because of the introduction of new multicast applications in the real world such as video conferencing, games, ATM applications etc. broad casting such as www, multimedia conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a flexible multicasting capability. Multicast is a relatively new form of communications where a single packet is transmitted to more than one receivers. The Internet does not manage the multicast group membership tightly. A multicast message is sent from a source to a group of destination hosts. A source sends a packet to a multicast group specifying as the multicast group address. The packet is automatically duplicated at intermediate routers and any hosts that joined the group can receive a copy of the packet. Because a host can receive transmitted data of any multicast groups, secure communications is more important in multicasting than in unicasting. The security in the multicast communication in the large groups is the major obstacles for effectively controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to control the intruders in the group communication. Group key management is mainly addresses upon the trust model developed by Group Key Management Protocol (GKMP). There are several group key management protocols that are proposed, this paper will however elaborate mainly on Group key management which has a sound scalability when compared with other central key management systems. This paper emphases protocol which provides a scope for the dynamic group operations like join the group, leave the group, merge without the need of central mechanisms. An important component for protecting group secrecy is re-keying. With the combination of strong public and private key algorithms this would become a better serve to the multicast security. Multicast routing protocols provide resilience against collaborating malicious nodes. PGKMP is a complete multipath protocol, in the sense that it provides the maximum security in the network when compared to the existing protocols like LKH etc. The security of PGKMP is mainly based on neighborhood authentication of the nodes, as well as on security associations, while the use of public key cryptography is minimized. The PGKMP protocol can be integrated on top of existing on-demand routing protocols such as LKH. A key reason for this good performance is the fact that PGKMP operates entirely on-demand with no periodic activity of any kind required within the network. PGKMP finds disjoint paths only, so the route discovery cost will be less as compared to LKH where all possible paths exist and a key server has to be maintained. Also due to the double encryption scheme provided to the protocol, the network is more secured. There is a scope to further decrease the overheads and increase more security with this Protocol (PGKMP) and a positive hope for the enhancement of this protocol. III. Existing System The existing GKM schemes still face the limitation of rekeying performance as the number of multicast services increases. However, in the foreseeable future, multiple multicast groups will co-exist in a single network due to the emergence of many group-based applications. In such a situation, it is likely that the service provider may suffer from considerable key management overhead for supporting multiple multicast groups. In existing system if the user wants to access from different server the user have to login each time for different server hence the key management process become too tedious to handle if the server number increases tremendously Once the master key has been change the entire configuration has to be configured to access the service.
  • 3. A Novel High Order Tree for Securing Key Management for Multicast Services www.iosrjournals.org 38 | Page Disadvantages  Rekeying management is too difficult to handle.  If any changes in the network configuration mean the entire key system has to be modified.  Group key management has limitation in managing the key. IV. Proposed System A new multiple group key management (MGKM) scheme, named the master-key-encryption based MGKM (MKE-MGKM) scheme,which can reduce the rekeying overhead from managing multiple group keys. The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master key encryption (MKE), to enhance the rekeying performance by alleviating the rekeying overhead. Compared with the MGKM schemes expanding the existing GKM schemes, the MKE-MGKM scheme can reduce the storage overhead of a key distribution center (KDC) by 75%. Hence this has been implemented for multicast service like video streaming and downloading to avoid the pirated movies and to avoid unauthorized users to view and download the videos in video service websites. Advantages  Efficient key management process.  No limitation in rekeying process.  Storage resource has been reduced.  Used in third-party data storage system. V. Problem Definition The existing GKM schemes targeted to a single multicast group are not directly applicable to the multiple multicast service environments. If each multicast group is managed by its own GKM scheme according to the existing GKM schemes, more independent multicast groups would be required. In this case, when a user subscribing to the multiple multicast services stops subscribing to all the services, all these multicast groups independently initiate the rekeying procedure, which may result in much more rekeying overhead. To alleviate the problem of unauthorized video watching and recording from sites. VI. Experimental Results MODULE DESCRIPTION 1. Multicast Service Module 2. Traffic Encryption key Generation 3. MKE based MGKM algorithm 4. Rekey Management. 5. Video layer coding 6.1. Multicast Service module In order to implement the multicast, i.e., the delivery of data only to the members of a group, in wireless networks, we need to an access control mechanism for the broadcasted messages, which guarantees confidentiality, protects digital contents, and facilitates accurate accounting. FIG.6.1 6.2. Traffic Encryption key Generation All these keys comprise a logical key tree, where the TEK is the root node, an IK is a leaf node, and the KEKs are the rest of the nodes in the key tree. It can significantly reduce the amount of rekeying overhead which is a logarithmic function of a group size.
  • 4. A Novel High Order Tree for Securing Key Management for Multicast Services www.iosrjournals.org 39 | Page FIG.6.2 6.3. MKE based MGKM algorithm The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master key encryption (MKE), to enhance the rekeying performance. Key distribution FIG.6.3 6.4. Rekey Management A rekeying mechanism for multiple groups by introducing a MKE-based key graph having the master and slave keys. Rekeying can significantly increase due to the number of multiple groups. 6.5.Video layer coding To deliver high quality video services, it becomes vital to consider the heterogeneous wireless infrastructure and multi-radio capability of mobile devices. FIG.6.4 VII. Conclusion And Future Work The key graph of the MKE-MGKM scheme is much simpler than that of other schemes; less memory is needed for storing the keys. Compared with other schemes, the MKE-MGKM scheme can significantly reduce the storage and communication overheads in the rekeying process, with acceptable computational overhead. It is expected that the MKEMGKM scheme can be a practical solution for various group applications, especially for those requiring many service groups, such as TV streaming services charged on a channel by channel basis. In future the concept can be applied for video broadcasting service to avoid unauthorized users to view and access the video. TEK IK 1 IK 2 IK n Data Encrypt Master Key Number of slave key generation Group control and key server Compromised key list Video file Time Slot Allocation Providing Authorization to Authenticated users Rearrangement of Timeslot dynamically Video Encoding Authorized user/Decoding Blocked unauthorized user by Genetic algorithm implementation
  • 5. A Novel High Order Tree for Securing Key Management for Multicast Services www.iosrjournals.org 40 | Page References [1] Lawrence Horte “Introduction to data multicasting”, 2008 [2] Zhang, J, Varadharajan, V and Mu, Y,” A novel dynamic key management scheme for secure multicasting,” ICON2003. The 11th IEEE International Conference on Network [3] C. K. Wong, M. G. Gouda, and S. S. Lam, “Secure group communications using key graphs,” 1998. [4] H. Lu, “A novel high-order tree for secure multicast key management”, IEEE Transactions on Computers, vol. 54, 2005. [5] Y. Challal and H. Seba, “Group key management protocols: A novel taxonomy,” International Journal of Information Technology,vol. 2, no. 1, pp. 105–118, 2005. [6] Sherman and McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEETSE: IEEE Transactions on Software Engineering, vol. 29, 2003. [7] J.-C.Lin, F. Lai, and H.-C. Lee, “Efficient group key management protocol with one-way key derivation,” in LCN. IEEE Computer Society, 2005, pp. 336–343. [Online].Available:http://doi.ieeecomputersociety.org/10.1109/LCN.2005.61 [8] Y. Sun and K. J. R. Liu, “Hierarchical group access control for secure multicast communications,” IEEE/ACM Trans. Netw, vol. 15, no. 6, pp. 1514–1526, 2007. [9] Q. Zhang and Y. Wang, “A centralized key management scheme for hierarchical access control,” in IEEE Globecom. IEEE Communication Society, 2004, pp. 2067–2071. [10] D. WALLNER, E. HARDER, , and R. AGEE, “Key management for multicast: Issues and architectures,” IETF, Request For Comments 2627, 1999. [11] R. L.Rivest, A.Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. [12] K. Koyama, “A master key for the RSA public-key cryptosystem,”Systems-Comput.-Controls, vol. 13, no. 1, pp. 63–70 (1983), 1982. [13] A. Kondracki, “The chinese remainder theorem,” Formalized Mathematics,vol. 6, no. 4, pp. 573–577, 1997. [14] L. R. YU and L. B. LUO, “The Generalization of the Chinese Remainder Theorem,” Springer Acta Mathematica Sinica, vol. 18,no. 3, pp. 531–538, 2002. [15] X. Zou, B. Ramamurthy, and S. S. Magliveras, “Chinese remainder theorem based hierarchical access control for secure group communication,” Lecture Notes in Computer Science, vol. 2229, pp 381–385, 2001. [16] X. Zheng, C.-T. Huang, and M. M. Matthews, “Chinese remainder theorem based group key management,” in ACM Southeast Regional Conference, D. John and S. N. Kerr, Eds. ACM, 2007, pp 266–271.