Appendix 14.A. Secure Group Communication

For the secure link-state routing protocol problem, we have recently proposed a novel key chain–based secure group key management scheme [18]. Our approach captures the merits of both centralized and distributed approaches and targets minimizing the communication and delay overhead due to key management that is critical in link-state flooding. Briefly, a set of secrets are first distributed to each user (node) from a centrally controlled key server before the secure group communication phase. During the actual communication, every group member can self-derive desired group/subgroup keys and then communicate with any possible subgroups without any help from the key server. Our work in many-to-many secure ...

Get Information Assurance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.