ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication

With the popularity of group-oriented  applications, secure and efficient communication among all  group members has become a major issue. An efficient key  management mechanism is the base and critical technology  of secure group communications. A distributed grouporiented  key management scheme without the participation  of third parties is proposed in the paper. The scheme  deploys Elliptic Curve Diffie-Hellman (ECDH) which is  more lightweight compared to regular Diffie-Hellman. The  approach includes group key establishment and rekeying  algorithms when there are membership changes. By using a  distributed architecture, the load of key management is  reduced. Specifically, the scheme can be extended to hybrid  architecture to provide better scalability. Consequently, the  extended scheme is both fault-tolerant and efficient in terms  of integrity and confidentiality. In all protocol suites, the  shared group key is calculated by scalar multiplication.  According to performance comparisons with other schemes,  the proposed scheme dramatically reduces communication  overhead and computational costs. Security analysis  indicates that the proposal provides a number of desirable  security properties, including group key secrecy, forward  secrecy and backward secrecy.

[1]  Song Ju,et al.  A lightweight key establishment in wireless sensor network based on elliptic curve cryptography , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.

[2]  Ming Lu Study on Secret Key Management Project of WSN Based on ECC , 2012, J. Networks.

[3]  Eleftheria Makri,et al.  Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..

[4]  Srinivas Sampalli,et al.  A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying , 2008, Int. J. Netw. Secur..

[5]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[6]  Hao Wang,et al.  A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity , 2011, J. Networks.

[7]  V. Sumathy,et al.  A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography , 2010, Int. J. Commun. Netw. Syst. Sci..

[8]  Hua-Yi Lin,et al.  Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[11]  Mark Manulis,et al.  Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[12]  Mark Manulis,et al.  Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[13]  Huan-Chung Lin,et al.  A Scalable ID-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks , 2007 .

[14]  S.A Vanstone Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..

[15]  Wei Yuan,et al.  An Improved Dynamic Password based Group Key Agreement against Dictionary Attack , 2012, J. Softw..

[16]  Atul Negi,et al.  An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2011, J. Comput..