Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/3570
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ambika, S. | - |
dc.contributor.author | Rajakumar, S. | - |
dc.contributor.author | Anakath, A. S. | - |
dc.contributor.author | Naresh, R. | - |
dc.date.accessioned | 2019-06-20T12:47:52Z | - |
dc.date.available | 2019-06-20T12:47:52Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | 8th International Symposium 2018 on “Innovative Multidisciplinary Research for Green Development”. 17th - 18th December, 2018. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 366-374. | en_US |
dc.identifier.isbn | 978-955-627-141-6 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/3570 | - |
dc.description.abstract | Distributed group communication is the most optimistic approach to provide a secure group communication in many emerging network applications such as peer to peer communication, Skype, Facebook, Whatsapp, PAY-TV, Video conferencing, Email, Twitter and online network games. Because, in distributed group communication the data are sent from any one of the group members to the remaining group members and also there is no centralized coordinator in the distributed group communication and hence it would take more computational complexity. Moreover, in distributed group communication, the users themselves generate and distribute the necessary keys to maintain the secrecy and group membership. Hence, providing security with less computation complexity is a challenging task in distributed group communication. In this paper, a detailed survey has been done towards various distributed group communication and also comparative performance analysis has been done for all the approaches. In order to do that, we have considered various parameters such as computation complexity, communication complexity and storage complexity of both the user and the server during key generation, key distribution and key updation process. Moreover, in this paper we have also included various security challenges that need to be solved to make the distributed group communication more secure. Finally, we have also given a solution to improve the various parameters in order to increase the security and performance of the distributed communication performed in various applications. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. | en_US |
dc.subject | Distributed group communication | en_US |
dc.subject | Authentication | en_US |
dc.subject | Availability | en_US |
dc.subject | Integrity | en_US |
dc.subject | Non-repudiation | en_US |
dc.title | Group key management schemes in distributed communication environment | en_US |
dc.type | Article | en_US |
Appears in Collections: | 8th International Symposium - 2018 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full papers 1 - Page 382-390.pdf | 306.34 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.