A new approach to scalable and fault-tolerant group key management protocols

Secure group communication is an increasingly popular research area having received much attention in recent years. However, most existing approaches construct the group key without caring about the type of the group itself and the environment in which it evolves. This leads to inefficient solution for real multicast groups. In this paper, we propose a new approach to enhance key management performance. In our solution, we take into consideration group characteristics. We first classify the various group characteristics and point out their influence on the efficiency of key management protocols. We, then, propose two key management protocols, which maintain good performance by adapting the key management process to the type of the group. A comparative Study and simulation results evaluate the efficiency of our approach.

[1]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[2]  Abdelmadjid Bouabdallah,et al.  QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP) , 2001, ICN.

[3]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[4]  Gene Tsudik,et al.  Communication-Efficient Group Key Agreement , 2001, SEC.

[5]  Olivier Chevassut,et al.  An integrated solution for secure group communication in wide-area networks , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[6]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[7]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[8]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[9]  Yongdae Kim,et al.  Secure group communication in asynchronous networks with failures: integration and experiments , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[10]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[11]  Klara Nahrstedt,et al.  Secure multicast protocol with copyright protection , 1999, Electronic Imaging.

[12]  Daniel Zappala,et al.  An Evaluation of Shared Multicast Trees with Multiple Active Cores , 2001, ICN.

[13]  Ernest F. Brickell,et al.  Secure Audio Teleconference , 1987, CRYPTO.

[14]  Ashok Samal,et al.  A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).

[15]  David Hutchison,et al.  EHBT: An Efficient Protocol for Group Key Management , 2001, Networked Group Communication.

[16]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[17]  Yongdae Kim,et al.  On the performance of group key agreement protocols , 2004, TSEC.

[18]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[21]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[22]  Abdelmadjid Bouabdallah,et al.  Ensuring fault-tolerance in group key distribution using multicast group characteristics , 2003 .

[23]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[24]  J. J. Garcia-Luna-Aceves,et al.  KHIP—a scalable protocol for secure multicast routing , 1999, SIGCOMM '99.

[25]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[26]  Whitfield Diffie,et al.  A Secure Audio Teleconference System , 1988, CRYPTO.