and
E[M ] ≥
ρ
1 − ρ
+
3(λ/µ){ρ − (1 − ρ)(λ/µ)}
2(1 − ρ)
+
,
(24)
where x
+
= max(x, 0).
Proof. Applying Lemma 3, 4 and 5 in Theorem 3, we
have the exact estimate of E[M ] as
E[M ] =
ρ
1 − ρ
+
1
2(1 − ρ)
n
3
λ
µ
ρ − 3(1 − ρ)
λ
µ
2
+ 2
λ
µ
π
y
(0, 1) + π
y
(2)
(0, 1)
o
(25)
Since L and L(L − 1) are both non-negative, we have
0 ≤ π
y
(0, 1) = E[L1
(M=0)
] ≤ E[L] = λ/µ, and
0 ≤ π
y
(2)
(0, 1) = E[L(L − 1)1
(M=0)
] ≤ E[L(L −
1)] = (λ/µ)
2
. Thus, we can obtain both the upper
and lower bound as in (23) and (24).
Remark 6. We may obtain a reasonable approxi-
mation (and possibly better upper bound) of E[M]
by replacing the estimates in the proof of Theorem
4 with E[L1
(M=0)
] ∼ (1 − ρ)E[L] and E[L(L −
1)1
(M=0)
] ∼ (1−ρ)E[L(L−1)]. However, in practi-
cal situation, as we can see in the following, the above
bounds may be sufficient.
If the service rate σ is large, most of the time the
system is empty and E[L1
(M=0)
] can be well approx-
imated by E[L]. Thus we may expect our bounds de-
rived from the assumptions is tight for a large σ. We
will check this conjecture.
Lemma 6. We have the following estimates of the dif-
ference for the large service rate of jobs σ:
E[L] − E[L1
{M=0}
] → 0, (26)
E[L(L − 1)] − E[L(L − 1)1
{M=0}
] → 0 as σ → ∞.
(27)
5 NUMERICAL ANALYSIS OF
THE BOUNDS
In this section, we briefly see the bounds of the mean
waiting time for encryption including its service time
(encryption time). As pointed out before, the waiting
time for processing encryptions in the group security
model corresponds the time duration when the secu-
rity level degrades, since we need to use the older key
to communicate inside the group.
Let W be the time required to finish all the en-
cryptions when a customer leaves the group. By
Little’s Formula (Wolff, 1989; Kleinrock, 1975), we
have E[W ] = E[M]/λ. Thus, using Theorem 4, the
bounds for E[W ] can be easily obtained. In the fol-
lowing, we fixed the service rate of the encryptions to
be σ = 10, 000. In Figure 1 - 3, the mean waiting
time E[W ] is depicted as the function of λ for vari-
ous µ. Note that ρ = λ
2
/σµ is the utilization of our
BMAP/M/1 queue and E[L] = λ/µ is its popula-
tion of the secure group. For the reference, not only
the bounds, but we also show the waiting time of both
the M/M/1 queue with the same utilization and the
batch-arrival M/M/1 queue where their batch size
is independent and identically to Poisson distribution
with its mean λ/µ. Comparing these graphs, although
we can see only bounds, E[W ] of the BMAP/M/1
queue is significantly larger than the ones of other
queues. Thus, we need to take into account the cor-
relation between the batches, or we underestimate the
time length of security degradation. Also, we can see
the bounds get tighter as the sojourn time of the cus-
tomer 1/µ gets shorter.
REFERENCES
Harney, H. and Muckenhirn, C. (1997a). Group key man-
agement protocol (gkmp) architecture. RFC 2094.
Harney, H. and Muckenhirn, C. (1997b). Group key man-
agement protocol (gkmp) sepcification. RFC 2093.
Kleinrock, L. (1975). Queueing Systems Vol. 1. John Wiley
and Sons.
Latouche, G. and Ramaswami, V. (1999). Introduction
to Matrix Analytic Methods in Stochastic Modeling.
SIAM.
Makimoto, N. (2001). Machigyouretsu Algorithm (Algo-
rithm of Queueing System). Asakura.
Sengupta, B. (1989). Markov processes whose steady state
distribution is matrix-exponential with an application
to the gi1 queue. Adv. Appl. Prob., (21):159–180.
Thomas, S. A. (2000). SSL and TLS Essentials: Securing
the Web. John Wiley and Sons.
Toyoizumi, H. and Takaya, M. (2004). Performance evalu-
ation of secure group communication. Journal of the
Operations Research Society of Japan, 47(1):38–50.
Tweedie, R. (1982). Operator-geometric stationary distribu-
tion for markov chains, with applications to queueing
models. Adv. Appl. Prob., (14):368–391.
Wallner, D., Harder, E., and Agee, R. (1999). Key manage-
ment for multicast: Issues and architectures. Request
for Comments: 2627.
Wolff, R. (1989). Stochastic modeling and the theory of
queues. Princeton-Hall.
Wong, C., Gouda, M., and Lam, S. (2000). Secure group
communications using key graphs. IEEE/ACM Trans.
on Networking, 8(1):16–30.
AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATION
287