Acerca de este artículo
Publicado en línea: 05 oct 2015
Páginas: 3 - 25
DOI: https://doi.org/10.1515/cait-2015-0038
Palabras clave
© R. Seetha et al.
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.