Adaptive Rekeying for Secure Group Communication Using Key Management Technique

 Abstract— Secure and reliable group communication is an active area of this paper. The main problem in secure group communication is group dynamics and key management. It focuses on trade-offs between storage cost and rekeying cost for secure multicasting. Membership in secure multicast group is dynamic and requires multiple updates in a single time frame. A scalable secure group communication model ensures that whenever there is a membership change, a new group key is generated and distributed to the group members with minimal computation and communication cost. The size of rekey messages for each group key update and encrypts. Additionally, some distinct features to describe a scheme to reduce the number of secrets further when revocations are periodic, that means whenever group membership changes from the group, the group controller performs rekeying only at the end of selected time periods. The joining the users or revoked users can access group communication until the group is rekeyed.

[1]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[2]  J. Limb,et al.  Editorial on the IEEE/OSA Journal of Lightwave Technology and the IEEE Journal on Selected Areas in Communications , 1986 .

[3]  Lixia Zhang,et al.  Host multicast: a framework for delivering multicast to end users , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[4]  Sandeep S. Kulkarni,et al.  Adaptive Rekeying for Secure Multicast , 2003 .

[5]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[6]  Haitham S. Cruickshank,et al.  Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.

[7]  John S. Baras,et al.  An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes , 2001, IEEE Trans. Inf. Theory.

[8]  Guevara Noubir,et al.  Optimal tree structure for key management of simultaneous join/leave in secure multicast , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[9]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[10]  Reihaneh Safavi-Naini,et al.  Efficient Revocation Schemes for Secure Multicast , 2001, ICISC.

[11]  Ivan Hal Sudborough,et al.  Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[12]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[13]  Srinivasan Seshan,et al.  A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..