IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151153                                                     

Batch Rekeying Management for Subscription Based Mobile User


Aarthi S, Karthika, Meena M, Geetha Rani S
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
In mobile computing, to provide entry to batch members batch key will be issued and gets upgraded whenever the batch gets rescinded. This will cause regeneration of batch key high up and extend the conveyance value which will degrade the performance. We have given a concept of batch rekeying in which, the conveyance cost gets reduced accordingly by evolving two techniques, named initial tree development and idealisation of the path tree. The first technique involves the setting up of the path in the way to drop the batch key high up and in turn, the second technique will make the path tree to stay idealised.

Aarthi S, Karthika, Meena M, Geetha Rani S

Batch Key Management, Batch Id, Multichannel, Dynamic Contributors


[1]. M. Park, Y. Park, H. Jeong, and S. Seo, “Secure Multiple Multicast Services in Wireless Networks,” IEEE Trans. Mobile Computing, vol. 12, no. 9, pp. 1712-1723, Sept. 2013.

[2]. M.-H. Park, Y.-H.Park, and S.-W. Seo, “A Cell-Based Decentralized Key Management Scheme for Secure Multicast in Mobile Cellular Networks,” Proc. IEEE 71st Vehicular Technology Conf. (VTC ’10-Spring), pp. 1-6, May 2010.

[3]. D.-H. Je, J.-S.Lee, Y. Park, and S.-W.Seo, “Computation-and-Storage-Efficient Key Tree Management Protocol for Secure Multicast Communications,” Computer Comm., vol. 33, no. 2, pp. 136-148, Feb. 2010.

[4]. J.S. Lee, J.H. Son, Y.H. Park, and S.W. Seo, “Optimal Level-Homogeneous Tree Structure for Logical Key Hierarchy,” Proc. Third Int’l Conf. Comm. Systems Software and Middleware and Workshops (COMSWARE ’08), pp. 677-681, Jan. 2008.

[5]. W.H.D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, “Dynamic Balanced Key Tree Management for Secure Multicast Communications,” IEEE Trans. Computers, vol. 56, no. 5, pp. 590-605, May 2007.

[6]. V. Kondratieva and S.-W. Seo, “Optimized Hash Tree for Authentication in Sensor Networks,” IEEEE Comm. Letters, vol. 11, no. 2, pp. 149-151, Feb. 2007

[7]. W.T. Zhu, “Optimizing the Tree Structure in Secure Multicast Key Management,” IEEE Comm. Letters, vol. 9, no. 5, pp. 477-479, May 2005.

[8]. J. S., S. Suri, and G. Varghese, “A Lower Bound for Multicast Key Distribution,” Computer Networks, vol. 47, no. 3, pp. 429-441, Feb. 2005.

[9]. Y. Sun, W. Trappe, and K.J.R. Liu, “A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,” IEEE/ ACM Trans. Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004.

[10]. A.T. Sherman and D.A. McGrew, “Key Establishment in Large Dynamic Groups Using One-Way Function Trees,” IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.

[11]. S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sept. 2003.

[12]. W. Trappe, J. Song, R. Poovendran, and K.J.R. Liu, “Key Distributionfor Secure Multimedia Multicasts via Data Embedding,” Proc. IEEE Int’l Conf. Acoustics, Speech, and Signal Processing (ICASSP ’01), pp. 1449-1452, 2001.


Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary - 2015
Date of Publication Print ISSN Online ISSN
2015-02-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
249-252 IJSRSET151153   Technoscience Academy

Cite This Article

Aarthi S, Karthika, Meena M, Geetha Rani S, "Batch Rekeying Management for Subscription Based Mobile User", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.249-252, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET151153.php