A Survey on Group Key Management Schemes

Abstract Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.

[1]  Yiling Wang,et al.  Efficient Key Management for Secure Wireless Multicast , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[2]  Tony Ballardie,et al.  Core Based Trees (CBT version 2) Multicast Routing - Protocol Specification - , 1997, RFC.

[3]  Hongke Zhang,et al.  Multicast Extension Support for Proxy MIPv6 , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[4]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[5]  Akihiro Shimizu,et al.  Simple And Secure password authentication protocol, ver.2(SAS-2) (メディア工学) , 2002 .

[6]  Miss Laiha Mat Kiah,et al.  An Implementation of Secure Group Communication in a Wireless Environment , 2012 .

[7]  Yacine Challal,et al.  Adaptive Group Key Management Protocol for Wireless Communications , 2012, J. Univers. Comput. Sci..

[8]  Jeng-Farn Lee,et al.  MKMS: Multicast key management scheme for Proxy Mobile IPv6 networks , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[9]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[10]  Yong Cheng,et al.  HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).

[11]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[12]  David Hutchison,et al.  Hydra: a decentralised group key management , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[13]  Miss Laiha Mat Kiah,et al.  Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).

[14]  Reham Abdellatif Abouhogail,et al.  Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .

[15]  Yiling Wang,et al.  Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[16]  L. Dondeti,et al.  A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .

[17]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[18]  Elina Eidkhani,et al.  A New Group Key Management Protocol Using Code for Key Calculation: CKC , 2010, 2010 International Conference on Information Science and Applications.

[19]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[20]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[21]  Colin Boyd,et al.  On Key Agreement and Conference Key Agreement , 1997, ACISP.

[22]  Alireza Nemaney Pour,et al.  CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement , 2012, ArXiv.

[23]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[24]  Yacine Challal,et al.  Key management with host mobility in dynamic groups , 2010, SIN.

[25]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[26]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[27]  T. Hardjono,et al.  Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[28]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[29]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[30]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[31]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[32]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[33]  K. J. Ray Liu,et al.  Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[34]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[35]  Trust T. Mapoka,et al.  Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .

[36]  Xiulin Hu,et al.  A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.

[37]  Matu-Tarow Noda,et al.  Simple and Secure Password Authentication Protocol (SAS) , 2000 .

[38]  Ashok Samal,et al.  Comparison of Hierarchical Key Distribution Schemes , 1999 .

[39]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[40]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[41]  Danny Dolev,et al.  Optimized Group Rekey for Group Communications Systems , 1999 .

[42]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[43]  Gene Tsudik,et al.  Communication-Efficient Group Key Agreement , 2001, SEC.

[44]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[45]  Akshai Aggarwal,et al.  A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.

[46]  K. J. Ray Liu,et al.  An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[47]  Bob Briscoe MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .

[48]  Dalit Naor,et al.  Broadcast Encryption , 1993, Encyclopedia of Multimedia.

[49]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[50]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[51]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.