Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Key Distribution for Large and Dynamic Multicast Groups

G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka


To provide security in multicasting groups which is
one of most challenging issue in network security and these are the vulnerable attacks. In large multicasting groups the addition and deletion process are occur alternatively which makes to provide security. In the literature, the most of the proposed schemes are suffered from collision problems, scalability problems and 1-affectall problems. Group key should be changed and distributed efficiently
and securely within the function, whenever function lists changes. The key-distribution (KD) problem is one of the main role in large groups. Efficient key distribution is one of the solutions in large multicast groups. In this paper, an efficient security to the group key is involved in large multicasting groups than the previously developed. A hierarchal tree is proposed here with each node as
group member. The main advantages of this approach are less storage of keys for each member function, the sponsor node selection can be reduced during addition and deletion which takes less computations and the tree size is minimum than the previous methods.


Hierarchal Tree, Key Distribution, Large Multicast Groups, Security.

Full Text:



G.Murali, Y.Srinuvasulu, N.Priyanka, G.Gurivi Reddy, “Key

Distrbution for Dynamic Multicast groups”, IJCST,dec,2011.

Dr.V.Valli Kumari, D.V.Naga Raju, Dr.K.V.S.V.N.Raju, “Efficient Conference key Distribution for Dynamic Groups”, IEEE Computer Society, Vol. 2, No. 4, Aug.2010, pp.167-171.

V.Vijayaraghavan, R.S.D.Wahida Banu, “Efficient key Management Architecture with Copyright Protection for Dynamic Groups”, JATIT, 2007, pp.60-64.

Ghassan Chaddoud, Andre Schaff, Isabelle Chrisment, “Dynamic Group Communication Security”, pp.50-56.

Guevara Noubir, “A Scalable Key-Distribution Scheme for Dynamic Multicast Groups”.

Himanshu Khurana and Rakesh Bobba, “DLPKH: Distributed Logical Public-Key Hierarchy”, Vol. 4812/2007, 2007, pp.1-3.

A. Ballardie, “Scalable Multicast Key Distribution”, May,pp.1-5.

Wade Trappe,K. J. Ray Liu, “ Multi-User Security: A Signal Processing and Networking Perspective”,pp.62-63.


MUTUAL KEY ESTABLISHMENT”, Jan, 2010, pp.13-28.

Bai, Redong, Yang, “Key Management Protocols A Selective Survey”,April, 2002, pp.4-6.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.