Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey

Key management is equally important as compared to any other security measure such as encryption and authentication. With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile multicast systems. Key management is widely being adopted in securing group communication for both wired and wireless networks. Securing group communication over wired networks is fairly well established; however, wireless networks bring additional challenges due to member mobility and increase in the number of members. This paper presents a comprehensive survey of group key management protocols in wireless mobile environments that employ multicast communication. They are classified into network dependent and independent protocols and further categorized into tree-based and cluster-based key management protocols. The survey clearly outlines the characteristics of each protocol along with highlighting their advantages and limitations with respect to real-world systems. The paper is concluded with a taxonomy of the individual protocols with respect to the defined requirements which provides a strong source of literature reference for researchers in this field.

[1]  Dharma P. Agrawal,et al.  Reduction in control overhead for a secure, scalable framework for mobile multicast , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[2]  Abdelmadjid Bouabdallah,et al.  IP mobile multicast: Challenges and solutions , 2004, IEEE Communications Surveys & Tutorials.

[3]  Akihiro Shimizu,et al.  Simple And Secure password authentication protocol, ver.2(SAS-2) (メディア工学) , 2002 .

[4]  Yacine Challal,et al.  Adaptive Group Key Management Protocol for Wireless Communications , 2012, J. Univers. Comput. Sci..

[5]  Claude Castelluccia,et al.  Hierarchical Mobile IPv6 (HMIPv6) Mobility Management , 2008, RFC.

[6]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[7]  Jeng-Farn Lee,et al.  MKMS: Multicast key management scheme for Proxy Mobile IPv6 networks , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[8]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[9]  K. J. Ray Liu,et al.  An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[10]  Basavaraj Patil,et al.  Proxy Mobile IPv6 , 2008, RFC.

[11]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[12]  Yacine Challal,et al.  Key management with host mobility in dynamic groups , 2010, SIN.

[13]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[14]  Yiling Wang,et al.  Efficient Key Management for Secure Wireless Multicast , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[15]  Hongke Zhang,et al.  Multicast Extension Support for Proxy MIPv6 , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[16]  Yong Cheng,et al.  HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).

[17]  Miss Laiha Mat Kiah,et al.  Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).

[18]  Donald F. Towsley,et al.  Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.

[19]  Thomas Hardjono,et al.  Multicast and Group Security , 2003 .

[20]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[21]  Matu-Tarow Noda,et al.  Simple and Secure Password Authentication Protocol (SAS) , 2000 .

[22]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[23]  Alireza Nemaney Pour,et al.  CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement , 2012, ArXiv.

[24]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[25]  Suresh Singh,et al.  RelM: reliable multicast for mobile networks , 1998, Comput. Commun..

[26]  T. Hardjono,et al.  Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[27]  Xiulin Hu,et al.  A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.

[28]  Miss Laiha Mat Kiah,et al.  An Implementation of Secure Group Communication in a Wireless Environment , 2012 .

[29]  K. J. Ray Liu,et al.  Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[30]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[31]  Kyoon-Ha Lee,et al.  Key management scheme for providing the confidentiality in mobile multicast , 2006, 2006 8th International Conference Advanced Communication Technology.

[32]  Elina Eidkhani,et al.  A New Group Key Management Protocol Using Code for Key Calculation: CKC , 2010, 2010 International Conference on Information Science and Applications.

[33]  Yiling Wang,et al.  Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).