A scalable multicast key management scheme for heterogeneous wireless networks

Secure multicast applications require key management that provides access control. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating. A communication-efficient class of key management schemes is those that employ a tree hierarchy. However, these tree-based key management schemes do not exploit issues related to the delivery of keying information that provide opportunities to further reduce the communication burden of rekeying. In this paper, we propose a method for designing multicast key management trees that match the network topology. The proposed key management scheme localizes the transmission of keying information and significantly reduces the communication burden of rekeying. Further, in mobile wireless applications, the issue of user handoff between base stations may cause user relocation on the key management tree. We address the problem of user handoff by proposing an efficient handoff scheme for our topology-matching key management trees. The proposed scheme also addresses the heterogeneity of the network. For multicast applications containing several thousands of users, simulations indicate a 55%-80% reduction in the communication cost compared to key trees that are independent of the network topology. Analysis and simulations also show that the communication cost of the proposed topology-matching key management tree scales better than topology-independent trees as the size of multicast group grows.

[1]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[2]  John S. Sobolewski,et al.  SideCar: building programmable datacenter networks without programmable switches , 2010, Hotnets-IX.

[3]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2002, IEEE J. Sel. Areas Commun..

[4]  Sanjoy Paul,et al.  Multicasting on the Internet and its Applications , 1998, Springer US.

[5]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[6]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[7]  Prem Dassanayake,et al.  User Mobility Modeling and Characterization of Mobility Patterns , 1997, IEEE J. Sel. Areas Commun..

[8]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[9]  K. C. Almeroth,et al.  Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .

[10]  Bernhard Plattner,et al.  Efficient security for large and dynamic multicast groups , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[11]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[12]  Christophe Diot,et al.  Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..

[13]  Øivind Kure,et al.  Multicast in 3G networks:: employment of existing IP multicast protocols in UMTS , 2002, WOWMOM '02.

[14]  B. R. Badrinath,et al.  A framework for delivering multicast messages in networks with mobile hosts , 1996, Mob. Networks Appl..

[15]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[16]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[17]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[18]  Young-Joo Suh,et al.  Multicast routing protocol in mobile networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[19]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[20]  Anthony Ephremides,et al.  Energy-Efficient Broadcast and Multicast Trees in Wireless Networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[21]  Fambirai Takawira,et al.  Nonclassical traffic modeling and performance analysis of cellular mobile networks with and without channel reservation , 2000, IEEE Trans. Veh. Technol..

[22]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[23]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[24]  K. J. Ray Liu,et al.  Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[25]  Suresh Singh,et al.  RelM: reliable multicast for mobile networks , 1998, Comput. Commun..

[26]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[27]  Yanghee Choi,et al.  A multicast-based handoff for seamless connection in picocellular networks , 1996, Proceedings of APCCAS'96 - Asia Pacific Conference on Circuits and Systems.

[28]  Moshe Sidi,et al.  New call blocking versus handoff blocking in cellular networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[29]  Kevin C. Almeroth,et al.  Collecting and modeling the join/leave behavior of multicast group members in the MBone , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.

[30]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .