Current Trends in Group Key Management

Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, we compared them against some pertinent performance criteria. Finally, we discuss the new research directions in group key management.

[1]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[2]  Xiulin Hu,et al.  A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.

[3]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[4]  Xiaozhou Li,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM '01.

[5]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[6]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[7]  Refik Molva,et al.  Scalable multicast security in dynamic groups , 1999, CCS '99.

[8]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[9]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[10]  Ran Canetti,et al.  Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.

[11]  David Hutchison,et al.  Hydra: a decentralised group key management , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[12]  Hyunsoo Yoon,et al.  A Decentralized Multi-Group Key Management Scheme , 2009, IEICE Trans. Commun..

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[15]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[16]  Yacine Challal,et al.  SAKM: a scalable and adaptive key management approach for multicast communications , 2004, CCRV.

[17]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[18]  Jim Alves-Foss,et al.  Network Simulation of Group Key Management Protocols , 2008 .

[19]  Matthew K. Franklin,et al.  Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[20]  Samuel Pierre,et al.  An Efficient and Secure Self-Healing Scheme for LKH , 2010, Journal of Network and Systems Management.

[21]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[22]  Toshihiko Kato,et al.  A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation , 2007, Comput. Networks.

[23]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[24]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[25]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.