A new secure group key management scheme for multicast over wireless cellular networks

In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in wireless networks. Moving users onto the key tree causes extra key management resources even though they are still in service. To take care of frequent handoff between wireless access networks, it is necessary to reduce the number of rekeying messages and the size of the messages. The multicast protocol used in wired networks does not perform well in wireless networks because multicast structures are fragile as the mobile node moves and connectivity changes. When we choose a key management scheme, the structure of the wireless network should be considered very carefully. In this paper, we design a key management tree such that neighbors on the key tree are also physical neighbors on the cellular network. By tracking the user location, we localize the delivery of rekeying messages to the users who need them. This lessens the amount of traffic in wireless and wired intervals of the network. The group key management scheme uses the prepositioned secret sharing scheme

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[3]  T. Hardjono,et al.  Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[4]  Gustavus J. Simmons,et al.  Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.

[5]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[6]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[7]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[8]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[9]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[10]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[11]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[12]  Gene Tsudik,et al.  Communication-Efficient Group Key Agreement , 2001, SEC.

[13]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[14]  Edward J. Delp,et al.  A Secure Group Key Management Scheme for Wireless Cellular Networks , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[15]  K. J. Ray Liu,et al.  An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[16]  Rahim Tafazolli,et al.  SIMPLE POSITIONING METHOD FOR LOCATION TRACKING IN MOBILE SATELLITE COMMUNICATION SYSTEMS , 2000 .

[17]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.