Using AES Contributory Key in clustering Communication

  • Unique Paper ID: 145642
  • PageNo: 674-676
  • Abstract:
  • A typical collaborative application operates as a peer group where members communicate via reliable many-to-many multicasting, sometimes these requiring reliable ordered can be message delivery. Many collaborative settings such as audio conferencing and video conferencing, white-boards, clustering, and their replication applications, requirement services which are not provideding by the current network infrastructure.. In some settings, group members must be aware of the exact (agreed upon) group membership. Since group communication systems provide these services, many collaborative applications use group communication systems (GCS) as the underlying messaging infrastructure. Advanced encryption strategy protocols generate group keys based on contributions of all group members. Particularly appropriate for relatively small collaborative peer groups, these protocols are resilient to many types of attacks. Unlike most group key distribution protocols, advanced encryption strategy offer strong security properties such as key independence and perfect forward secrecy. We prove that it provides both Virtual Synchrony and the security properties of Group Diffie-Hellman, in the presence of any sequence of (potentially cascading) node failures, recoveries, network partitions, and heals. We implemented a secure group communication service, Secure Spread, based on our AES key agreement protocol and Spread group communication system.
add_icon3email to a friend

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145642,
        author = {D.Udaye Kumar and Prof. S. Ramakrishna},
        title = {Using AES Contributory Key  in clustering Communication},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {10},
        pages = {674-676},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145642},
        abstract = {A typical collaborative application operates as a peer group where members communicate via reliable many-to-many multicasting, sometimes these requiring reliable ordered can be message delivery. Many collaborative settings such as audio conferencing and video conferencing, white-boards, clustering, and their replication applications, requirement services which are not provideding by the current network infrastructure.. In some settings, group members must be aware of the exact (agreed upon) group membership. Since group communication systems provide these services, many collaborative applications use group communication systems (GCS) as the underlying messaging infrastructure. Advanced encryption strategy protocols generate group keys based on contributions of all group members. Particularly appropriate for relatively small collaborative peer groups, these protocols are resilient to many types of attacks. Unlike most group key distribution protocols, advanced encryption strategy offer strong security properties such as key independence and perfect forward secrecy. We prove that it provides both Virtual Synchrony and the security properties of Group Diffie-Hellman, in the presence of any sequence of (potentially cascading) node failures, recoveries, network partitions, and heals. We implemented a secure group communication service, Secure Spread, based on our AES key agreement protocol and Spread group communication system. },
        keywords = {Security and protection, distributed systems, fault tolerance, group communication, AES network protocols.},
        month = {},
        }

Cite This Article

Kumar, D., & Ramakrishna, P. S. (). Using AES Contributory Key in clustering Communication. International Journal of Innovative Research in Technology (IJIRT), 4(10), 674–676.

Related Articles