High Performance Group Merging/Splitting Scheme for Group Key Management

The group merging/splitting event is different to the joining/leaving events in which only a member joins or leaves group, but in the group merging/splitting event two small groups merge together into a group or a group is divided into two independent parts. Rekeying is an importance issue for key management whose target is to guarantee forward security and backward security in case of membership changes, however rekeying efficiency is related to group scale in most existing group key management schemes, so as to those schemes are not suitable to the applications whose rekeying time delay is limited strictly. In particular, multiple members are involved in the group merging/splitting event, thus the rekeying performance becomes a worried problem. In this paper, a high performance group merging/splitting group key management scheme is proposed based on an one-encryption-key multi-decryption-key key protocol, in the proposed scheme each member has an unique decryption key that is corresponding to a common encryption key so as to only the common encryption key is updated when the group merging/splitting event happens, however the secret decryption key still keeps unchanged. In efficiency aspect, since no more than a message on merging/splitting event is sent, at time the network load is reduced since only a group member’s key material is enough for other group members to agree a fresh common encryption key. In security aspect, our proposed scheme achieves the key management security requirements including passive security, forward security, backward security and key independence. Therefore, our proposed scheme is suitable to the dynamitic networks that the rekeying time delay is limited strictly such as tolerate delay networks.

[1]  Sandeep S. Kulkarni,et al.  Key-update distribution in secure group communication , 2010, Comput. Commun..

[2]  Philip Samuel,et al.  A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks , 2011, Inf. Secur. J. A Glob. Perspect..

[3]  Yi Liu,et al.  A Public Key Encryption Scheme with One-Encryption and Multi-Decryption: A Public Key Encryption Scheme with One-Encryption and Multi-Decryption , 2012 .

[4]  Deep Medhi,et al.  A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.

[5]  Stephen B. Wicker,et al.  On the Rekeying Load in Group Key Distributions Using Cover-Free Families , 2012, IEEE Transactions on Information Theory.

[6]  Stephen M. Matyas,et al.  Decentralized group key management for secure multicast communications , 1999, Comput. Commun..

[7]  Seung-Woo Seo,et al.  Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..

[8]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[9]  Kaoru Kurosawa,et al.  Multi-recipient Public-Key Encryption with Shortened Ciphertext , 2002, Public Key Cryptography.

[10]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Ronggong Song,et al.  A Scalable Group Key Management Protocol , 2008, IEEE Communications Letters.

[13]  Jian Zhou,et al.  Autonomous Shared Key Management Scheme for Space Networks , 2013, Wirel. Pers. Commun..

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Jacques Stern,et al.  Extended Notions of Security for Multicast Public Key Cryptosystems , 2000, ICALP.

[16]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[17]  JongWon Kim,et al.  An efficient LKH tree balancing algorithm for group key management , 2006, IEEE Communications Letters.

[18]  Kwangjo Kim,et al.  A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem , 2002, ACISP.

[19]  Jingsha He,et al.  Distributed Group Key Management in Wireless Mesh Networks , 2012 .

[20]  Yi Mu,et al.  Asymmetric Group Key Agreement , 2009, EUROCRYPT.

[21]  Michele Nogueira Lima,et al.  Survivable key management on WANETs , 2011, IEEE Wireless Communications.

[22]  Liu Yi,et al.  A Public Key Encryption Scheme with One-Encryption and Multi-Decryption , 2012 .

[23]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[24]  Josep Domingo-Ferrer,et al.  Asymmetric group key agreement protocol for open networks and its application to broadcast encryption , 2011, Comput. Networks.

[25]  Sang-Ho Lee,et al.  A Group Key Management Scheme Using Core Based Tree and Height Balanced Tree , 2004, IEICE Trans. Inf. Syst..

[26]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[27]  Özgür B. Akan,et al.  Performance of TCP protocols in deep space communication networks , 2002, IEEE Communications Letters.

[28]  Baocang Wang,et al.  Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..