A comparative performance analysis of reliable group rekey transport protocols for secure multicast

In this paper, we present a new scalable and reliable key distribution protocol for group key management schemes that use logical key hierarchies (LKH) for scalable group rekeying. Our protocol called WKA-BKR is based upon two ideas--weighted key assignment and batched key retransmission--both of which exploit the special properties of LKH and the group rekey transport payload to reduce the bandwidth overhead of the reliable key delivery protocol. Using both analytic modeling and simulation, we compare the performance of WKA-BKR with that of other rekey transport protocols, including a recently proposed protocol based on proactive FEC. Our results show that for most network loss scenarios, the bandwidth used by WKA-BKR is lower than that of the other protocols.

[1]  Yang Richard Yang,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.

[2]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[3]  Don Towsley,et al.  Real-Time Reliable Multicast Using Proactive Forward Error Correction TITLE2: , 1998 .

[4]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[5]  ZHANGLi-xia,et al.  A reliable multicast framework for light-weight sessions and application level framing , 1995 .

[6]  Raja Mukhopadhyay,et al.  A Reliable Multicast Framework for Applications , 1996 .

[7]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[8]  Donald F. Towsley,et al.  A comparison of sender-initiated and receiver-initiated reliable multicast protocols , 1994, IEEE J. Sel. Areas Commun..

[9]  W BiersackErnst,et al.  Performance comparison of centralized versus distributed error recovery for reliable multicast , 2000 .

[10]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[11]  Sanjoy Paul,et al.  RMTP: a reliable multicast transport protocol , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[12]  Yang Richard Yang,et al.  Protocol design for scalable and reliable group rekeying , 2001, TNET.

[13]  J. J. Garcia-Luna-Aceves,et al.  A comparison of known classes of reliable multicast protocols , 1996, Proceedings of 1996 International Conference on Network Protocols (ICNP-96).

[14]  Sushil Jajodia,et al.  A Scalable and Reliable Key Distribution Protocol for Multicast Group Rekeying , 2002 .

[15]  Dilip D. Kandlur,et al.  Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[16]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[17]  Steven McCanne,et al.  A reliable multicast framework for light-weight sessions and application level framing , 1995, SIGCOMM '95.

[18]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[19]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[20]  M. Handley An Examination of MBone Performance , 1997 .

[21]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Don Towsley,et al.  Packet loss correlation in the MBone multicast network , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[23]  David R. Cheriton,et al.  Evaluating the utility of FEC with reliable multicast , 1999, Proceedings. Seventh International Conference on Network Protocols.

[24]  Thomas Hardjono,et al.  An Architecture for Conference-Support Using Secured Multicast , 1998, HPN.

[25]  K. J. Ray Liu,et al.  Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[26]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[27]  Ernst W. Biersack,et al.  Performance comparison of centralized versus distributed error recovery for reliable multicast , 2000, TNET.

[28]  Thomas Hardjono,et al.  A Framework for Group Key Management for Multicast Security , 2000 .