KTR: An efficient key management scheme for air access control

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To provide secure access to data in wireless broadcast services, symmetric key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. In this paper, we propose an efficient key management scheme (namely KTR) to handle key distribution with regarding to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs, instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45% of communication overhead in the broadcast channel and about 50% of decryption cost for each user, compared with conventional approaches based on logical key hierarchy.

Original languageEnglish (US)
Title of host publicationMobiQuitous 2005
Subtitle of host publicationSecond Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
Pages499-501
Number of pages3
DOIs
StatePublished - 2005
EventMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services - San Diego, CA, United States
Duration: Jul 17 2005Jul 21 2005

Publication series

NameMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services

Other

OtherMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
Country/TerritoryUnited States
CitySan Diego, CA
Period7/17/057/21/05

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'KTR: An efficient key management scheme for air access control'. Together they form a unique fingerprint.

Cite this