Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication

Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication

Priyanka Ahlawat, Kanishka Tyagi
Copyright: © 2022 |Pages: 15
ISBN13: 9781799877899|ISBN10: 1799877892|EISBN13: 9781799877912
DOI: 10.4018/978-1-7998-7789-9.ch007
Cite Chapter Cite Chapter

MLA

Ahlawat, Priyanka, and Kanishka Tyagi. "Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication." Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, IGI Global, 2022, pp. 112-126. https://doi.org/10.4018/978-1-7998-7789-9.ch007

APA

Ahlawat, P. & Tyagi, K. (2022). Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication. In B. Gupta (Ed.), Advances in Malware and Data-Driven Network Security (pp. 112-126). IGI Global. https://doi.org/10.4018/978-1-7998-7789-9.ch007

Chicago

Ahlawat, Priyanka, and Kanishka Tyagi. "Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication." In Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, 112-126. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-7789-9.ch007

Export Reference

Mendeley
Favorite

Abstract

In the real scenario, there is a large multicast group where nodes leave and join frequently, and also the number of nodes leaving and joining is also not proportionate. Hence, scalable rekeying process is an important issue that needs to be concerned for the secured group communication for dynamic groups. In basic rekeying scheme, which is based on the logical key hierarchy, the rekeying cost depends on the logarithm of the size of group for a join or depart request by the user. However, the memory efficiency of this group rekeying protocol (GREP) is a huge storage overhead over the system. The authors aim to provide a survey of various group key management schemes and then propose an efficient scalable solution based on linked LKH and the linked list data structure. Results have shown that the Linked LKH algorithm has a very low effective cost for rekeying the LKH as compared to the basic LKH algorithm (i.e., based on the number of new joined and departure requests).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.