Hierarchical group key management for wireless mesh networks using multivariate symmetric polynomials

Group communication oriented applications such as multimedia streaming, distant learning, networked gaming, distributed information storage and file sharing can benefit from the community oriented nature of Wireless Mesh Networks (WMNs). However, providing secure group communication services on a WMN platform can be challenging because of the inherent vulnerabilities in wireless broadcasting, distributed network architecture, multi-hop communication and the mobility of mesh clients. Direct implementation of group key management (GKM) schemes developed for wired or other wireless platforms is difficult, if not impossible. Despite these challenges, this paper proposes a symmetric multivariable polynomial based hierarchical GKM with efficient re-keying capabilities. Efficiency in re-keying is achieved by allowing members of the secure communication group to renew the shared traffic encryption key individually and independently upon membership changes. Using the information delivered to the group members during the initial key distribution phase, this renewal process can continue during a group communication session as long as the total number of membership does not reach beyond or fall below a configurable threshold.

[1]  Yang Richard Yang,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.

[2]  Cristina Nita-Rotaru,et al.  Secure group communication in wireless mesh networks , 2009, Ad Hoc Networks.

[3]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[4]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[5]  Bing He,et al.  An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[6]  Dharma P. Agrawal,et al.  Multivariate symmetric polynomial based Group Key Management for Vehicular Ad hoc Networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Dharma P. Agrawal,et al.  Ad Hoc and Sensor Networks: Theory and Applications , 2006 .

[8]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[9]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[10]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[11]  Ing-Ray Chen,et al.  Hierarchical Agent-Based Secure Multicast for Wireless Mesh Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[12]  Bruce M. Maggs,et al.  The feasibility of supporting large-scale live streaming applications with dynamic application end-points , 2004, SIGCOMM.

[13]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.