Dynamic Balanced Key Tree Management for Secure Multicast Communications

A secure multicast communication is important for applications such as pay-per-view and secure videoconferencing. A key tree approach has been proposed by other authors to distribute the multicast group key in such a way that the rekeying cost scales with the logarithm of the group size for a join or depart request. The efficiency of this key tree approach critically depends on whether the key tree remains balanced over time as members join or depart. In this paper, we present two merging algorithms suitable for batch join requests. To additionally handle batch depart requests, we extend these two algorithms to a batch balanced algorithm. Simulation results show that our three algorithms not only maintain a balanced key tree, but their rekeying costs are lower compared with those of existing algorithms

[1]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[2]  Zhili Sun,et al.  Multi-layers balanced LKH , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[3]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[4]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[6]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[7]  Ingrid Verbauwhede,et al.  The energy cost of secrets in ad-hoc networks , 2002 .

[8]  Francisco Rico-Novella,et al.  Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[9]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[10]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[11]  Haitham S. Cruickshank,et al.  Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.

[12]  Pankaj Rohatgi,et al.  Maintaining Balanced Key Trees for Secure Multicast , 1999 .

[13]  Dong Young Lee,et al.  Protocol design for scalable and reliable group rekeying , 2001, SPIE ITCom.

[14]  Upkar Varshney Multicast Support in Mobile Commerce Applications , 2002, Computer.

[15]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[16]  Ahmet M. Eskicioglu,et al.  Multimedia security in group communications: recent progress in key management, authentication, and watermarking , 2003, Multimedia Systems.

[17]  Adrian Perrig,et al.  Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication , 1999 .

[18]  David K. Y. Yau,et al.  Distributed collaborative key agreement protocols for dynamic peer groups , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[19]  Sanjoy Paul,et al.  Multicasting on the Internet and its Applications , 1998, Springer US.

[20]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[21]  Haitham S. Cruickshank,et al.  Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..

[22]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[23]  Nansi Shi,et al.  Mobile Commerce Applications , 2004 .

[24]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[25]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[26]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[27]  Upkar Varshney,et al.  Multicast over wireless networks , 2002, CACM.

[28]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[29]  T. Hardjono,et al.  Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).