TY - GEN
T1 - KTR
T2 - MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
AU - Gu, Qijun
AU - Liu, Peng
AU - Lee, Wang Chien
AU - Chu, Chao Hsien
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - To provide secure access to data in wireless broadcast services, symmetric key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. In this paper, we propose an efficient key management scheme (namely KTR) to handle key distribution with regarding to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs, instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45% of communication overhead in the broadcast channel and about 50% of decryption cost for each user, compared with conventional approaches based on logical key hierarchy.
AB - To provide secure access to data in wireless broadcast services, symmetric key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. In this paper, we propose an efficient key management scheme (namely KTR) to handle key distribution with regarding to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs, instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45% of communication overhead in the broadcast channel and about 50% of decryption cost for each user, compared with conventional approaches based on logical key hierarchy.
UR - http://www.scopus.com/inward/record.url?scp=33749523243&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33749523243&partnerID=8YFLogxK
U2 - 10.1109/MOBIQUITOUS.2005.33
DO - 10.1109/MOBIQUITOUS.2005.33
M3 - Conference contribution
AN - SCOPUS:33749523243
SN - 0769523757
SN - 9780769523750
T3 - MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
SP - 499
EP - 501
BT - MobiQuitous 2005
Y2 - 17 July 2005 through 21 July 2005
ER -