A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications

In today's Internet era, group communications have become more and more essential for many emerging applications. Given the openness of today's networks, efficient and secure distribution of common key is an essential issue for secure communications in the group. To maintain confidentiality during communication in the group, all authorized members require a common key called the group key in advance. This paper proposes a group key distribution and authentication protocol for dynamic access control in secure group communication using Chinese remainder theorem (CRT), which is highly secure and computationally efficient. The proposed protocol (1) has drastically reduced the computation complexity of group controller (GC) and members, (2) has provided intense security by means of an additional secret parameter used by GC and members, (3) has minimized storage and communication overheads, (4) has been decentralized for higher scalability so that it can efficiently handle large‐scale changes in the group membership, and (5) is suitable for many practical applications due to intense security along with low computation and storage overheads. Detailed security analysis proves that our protocol can guarantee the privacy and security requirements of group communications. Moreover, performance analysis also verifies the efficiency and effectiveness of the proposed protocol. The proposed protocol has been experimented on star topology‐based key distribution system and observed that the protocol significantly reduces the computation cost and minimizes the communication and storage overheads.

[1]  Rajendra Kumar,et al.  Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups , 2020 .

[2]  Bashir Alam,et al.  Efficient and Secure Key Management for Conditional Access Systems , 2020, IEEE Transactions on Consumer Electronics.

[3]  A. S. Anakath,et al.  A novel RSA algorithm for secured key transmission in a centralized cloud environment , 2020, Int. J. Commun. Syst..

[4]  Aravind Karrothu,et al.  Group and hierarchical key management for secure communications in internet of things , 2020, Int. J. Commun. Syst..

[5]  Rajendra Kumar,et al.  A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem , 2020, J. King Saud Univ. Comput. Inf. Sci..

[6]  Bashir Alam,et al.  Key Management Scheme for Secure Group Communication , 2020 .

[7]  Harmanpreet Singh Grover,et al.  A secure authentication protocol for wearable devices environment using ECC , 2019, J. Inf. Secur. Appl..

[8]  Lein Harn,et al.  Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) , 2019, Secur. Commun. Networks.

[9]  Bashir Alam,et al.  Efficient and secure conditional access system for pay-TV systems , 2019, Multimedia Tools and Applications.

[10]  Amin Mesmoudi,et al.  SKWN: Smart and dynamic key management scheme for wireless sensor networks , 2019, Int. J. Commun. Syst..

[11]  Vinod Kumar,et al.  An Efficient and Scalable Distributed Key Management Scheme Using Ternary Tree for Secure Communication in Dynamic Groups , 2020 .

[12]  S. K. Pandey,et al.  Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler’s Theorem and Application in Cloud Computing , 2018 .

[13]  Manik Lal Das,et al.  Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks , 2017, Comput. Commun..

[14]  Rajendra Kumar,et al.  An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem , 2017 .

[15]  Wen-Guey Tzeng,et al.  Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members , 2017, Comput. Commun..

[16]  Hanumat G. Sastry,et al.  Smart and Innovative Trends in Next Generation Computing Technologies , 2017, Communications in Computer and Information Science.

[17]  Alwyn Roshan Pais,et al.  A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network , 2015, ICDCIT.

[18]  Chin-Chen Chang,et al.  An authenticated group key distribution mechanism using theory of numbers , 2014, Int. J. Commun. Syst..

[19]  Arputharaj Kannan,et al.  Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..

[20]  Xinyi Huang,et al.  Provably Secure Group Key Management Approach Based upon Hyper-Sphere , 2014, IEEE Transactions on Parallel and Distributed Systems.

[21]  V. Rhymend Uthariaraj,et al.  Huffman based conditional access system for key distribution in digital TV multicast , 2013, Multimedia Tools and Applications.

[22]  R. S. Bichkar,et al.  Scalable Key Transport Protocol Using Chinese Remainder Theorem , 2013, SSCC.

[23]  Arputharaj Kannan,et al.  Centralized key distribution protocol using the greatest common divisor method , 2013, Comput. Math. Appl..

[24]  Chin-Chen Chang,et al.  A Construction for Secret Sharing Scheme with General Access Structure , 2013, J. Inf. Hiding Multim. Signal Process..

[25]  K. Saravanan,et al.  Efficient Star Topology based Multicast Key Management Algorithm , 2012 .

[26]  Andrés Ortiz,et al.  Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm , 2011, CISIS.

[27]  Iuon-Chang Lin,et al.  Multicast Key Management without Rekeying Processes , 2010, Comput. J..

[28]  Chin-Chen Chang,et al.  A novel key management scheme for dynamic multicast communications , 2009, Int. J. Commun. Syst..

[29]  Chin-Tser Huang,et al.  Chinese remainder theorem based group key management , 2007, ACM-SE 45.

[30]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[31]  Haibin Lu,et al.  A novel high-order tree for secure multicast key management , 2005, IEEE Transactions on Computers.

[32]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[33]  Richard E. Ladner,et al.  Algorithms for dynamic multicast key distribution trees , 2003, PODC '03.

[34]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[35]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[36]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[37]  Pankaj Rohatgi,et al.  Maintaining Balanced Key Trees for Secure Multicast , 1999 .