Access control for group communications must ensure that only legitimate users can access the authorised data streams. This could be done by distributing an encrypting key to each member of the group to be secured. To achieve a high level of security, the group key should be changed every time a user joins or leaves the group, so that a former group member has no access to current communications and a new member has no access to previous communications. Since group memberships could be very dynamic, the group key should be changed frequently. So far, different schemes for efficient key distribution have been proposed to limit the key-distribution overhead. In previous works, the performance comparison among these different schemes have been based on simulative experiments, where users join and leave secure groups according to a basic statistical model of users' behaviour. In this paper, we propose a new statistical model to account for the behaviour of users and compare it to the modelling approach so far adopted in the literature. Our new model is able to to lead the system to a steady state (allowing a superior statistical confidence of the results), as opposed to current models in which the system is permanently in a transient and diverging state. We also provide analytical formulations of the main performance metrics usually adopted to evaluate key distribution systems, such as rekey overheads and storage overheads. Then, we validate our simulative outcomes with results obtained by analytical formulations. Copyright © 2009 John Wiley & Sons, Ltd.
[1]
B. Sanders,et al.
Cell capacity engineering methods in multilayered cellular networks with application to GSM 900/1800 dual band operation
,
1999,
Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No.99CH36324).
[2]
Byrav Ramamurthy,et al.
Hierarchy-based access control in distributed environments
,
2001,
ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[3]
K. J. Ray Liu,et al.
Scalable hierarchical access control in secure group communications
,
2004,
IEEE INFOCOM 2004.
[4]
Hugh Harney,et al.
Group Key Management Protocol (GKMP) Specification
,
1997,
RFC.
[5]
Mostafa Ammar,et al.
Security issues and solutions in multicast content distribution: a survey
,
2003
.
[6]
Qiong Zhang,et al.
A centralized key management scheme for hierarchical access control
,
2004,
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[7]
Mohamed G. Gouda,et al.
Secure group communications using key graphs
,
2000,
TNET.
[8]
Matthew K. Franklin,et al.
Self-healing key distribution with revocation
,
2002,
Proceedings 2002 IEEE Symposium on Security and Privacy.