Secure Group Communication for Mobile P2P Groups: A Survey

This report presents an overview over secure group communication paradigms in ad hoc networks, with especial attention to join and leave algorithms. Although classical group communication, after more than 25 years of development, is by now well understood and formalized, group communication for ad hoc networks is still under development. Firstly, the paradigm of groups in distributed computing is considered, distinguishing between classical, multicast and mobile ad hoc groups. Purpose, features, and system architecture of group communication systems are presented in the light of historical evolution of this concept. Further, security issues in group communication are outlined, focusing on the changes to the system architecture which are necessary for making a group communication system secure. Finally, an overview over group key management in group communication is given.

[1]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[2]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[3]  Michael K. Reiter,et al.  Integrating security in a group oriented distributed system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Kenneth P. Birman,et al.  The process group approach to reliable distributed computing , 1992, CACM.

[5]  Michael K. Reiter,et al.  The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.

[6]  Michael K. Reiter,et al.  How to securely replicate services , 1992, TOPL.

[7]  Louise E. Moser,et al.  The Totem single-ring ordering and membership protocol , 1995, TOCS.

[8]  Robbert van Renesse,et al.  Horus: a flexible group communication system , 1996, CACM.

[9]  Danny Dolev,et al.  The Transis approach to high availability cluster communication , 1996, CACM.

[10]  Li Gong,et al.  Enclaves: Enabling Secure Collaboration Over the Internet , 1996, IEEE J. Sel. Areas Commun..

[11]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[12]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[13]  Roberto Baldoni,et al.  Architecture for group communication in mobile systems , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[14]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[15]  L. Dondeti,et al.  A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .

[16]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[17]  ProtocolsLakshminath R. Dondeti Survey and Comparison of Secure Group Communication , 1999 .

[18]  Danny Dolev,et al.  Optimized Group Rekey for Group Communications Systems , 1999 .

[19]  Frank Stajano,et al.  The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.

[20]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[21]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[22]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[23]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[24]  Tuomas Aura,et al.  Towards a Survivable Security Architecture for Ad-Hoc Networks , 2001, Security Protocols Workshop.

[25]  Idit Keidar,et al.  Group communication specifications: a comprehensive study , 2001, CSUR.

[26]  Gruia-Catalin Roman,et al.  Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[27]  Danny Dolev,et al.  The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. , 2001 .

[28]  Louise E. Moser,et al.  The SecureRing group communication system , 2001, TSEC.

[29]  Yongdae Kim,et al.  On the performance of group key agreement protocols , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[30]  Mohamed Eltoweissy,et al.  Multi-level secure multicast: the rethinking of secure locks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[31]  Günter Hommel,et al.  Localized group membership service for ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[32]  Abdelsalam Helal,et al.  An efficient algorithm for maintaining consistent group membership in ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[33]  Colin Boyd,et al.  Round-Optimal Contributory Conference Key Agreement , 2003, Public Key Cryptography.

[34]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[35]  Roy Friedman,et al.  Fuzzy Group Membership , 2003, Future Directions in Distributed Computing.

[36]  Raghav Bhaskar Group Key Agreement in Ad hoc Networks , 2003 .

[37]  Antonio Corradi,et al.  AGAPE: a location-aware group membership middleware for pervasive computing environments , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[38]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[39]  Kwangjo Kim,et al.  An Efficient Tree-Based Group Key Agreement Using Bilinear Map , 2003, ACNS.

[40]  Shivakant Mishra,et al.  Flexible intrusion tolerant group membership protocol , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..

[41]  Ratna Dutta,et al.  Provably Secure Authenticated Tree Based Group Key Agreement , 2004, ICICS.

[42]  Patrick Th. Eugster,et al.  Pilot: probabilistic lightweight group communication system for ad hoc networks , 2004, IEEE Transactions on Mobile Computing.

[43]  Christian Rohner Building Secure Communities in Spontaneously Networked Environments , 2004 .

[44]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[45]  Gene Tsudik,et al.  Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.

[46]  Mark Manulis,et al.  Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[47]  Yacine Challal,et al.  Group Communication Security , 2005 .

[48]  Françoise Sailhan,et al.  Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.

[49]  Yvo Desmedt,et al.  A secure and scalable Group Key Exchange system , 2005, Inf. Process. Lett..

[50]  Jim Alves-Foss,et al.  Performance of Group Key Agreement Protocols over Multiple Operations , 2005, IASTED PDCS.

[51]  Valérie Issarny,et al.  An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[52]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[53]  Gene Tsudik,et al.  Secure spread: an integrated architecture for secure group communication , 2005, IEEE Transactions on Dependable and Secure Computing.

[54]  Ratna Dutta,et al.  Overview of Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..

[55]  Jennifer L. Welch,et al.  Random Walk for Self-Stabilizing Group Communication in Ad Hoc Networks , 2006, IEEE Trans. Mob. Comput..

[56]  Roy Friedman,et al.  Practical Byzantine Group Communication , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[57]  Roy Friedman,et al.  RaWMS -: random walk based lightweight membership service for wireless ad hoc network , 2006, MobiHoc '06.

[58]  Mark Manulis,et al.  Security-Focused Survey on Group Key Exchange Protocols , 2006, IACR Cryptol. ePrint Arch..