DM-GKM: A key management scheme for dynamic group based applications

Abstract In recent years, group-based applications (GBAs) have gained popularity due to their interesting and promising functionalities such as video on demand, teleconferencing, and pay per view. The advancements in wireless networks and the emergence of mobile devices such as smartphones and tablets have also increased the demands for GBAs. However, the implementation of group key management protocols for GBAs leads to significant computational, storage and communication overheads as well as potential system bottlenecks due to the high mobility of group members. The goal of this research is to address these issues and design a lightweight key management framework that requires fewer computations of keys for dynamic mobile users. A new group key management framework is proposed in this research, which is called the “DynaMic Group Key Management” (DM-GKM) framework. This framework exploits the advantages of the asymmetric key cryptosystem in order to guarantee security and it alleviates the rekeying overhead and distributing the independent Group Key (GK) for each cluster. Simulation and performance analysis demonstrates that the DM-GKM framework fulfils the requirements of a lightweight key management framework for large, dynamic groups of users. An analytical model is also developed to determine the performance and security features of the proposed framework.

[1]  Yacine Challal,et al.  Adaptive Group Key Management Protocol for Wireless Communications , 2012, J. Univers. Comput. Sci..

[2]  Paul Barrett,et al.  Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.

[3]  Eric Harder,et al.  Logical Key Hierarchy Protocol , 1999 .

[4]  Qingyu Zhang,et al.  On rekey policies for secure group applications , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[5]  T. Hardjono,et al.  Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[6]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[7]  J. Quisquater,et al.  Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .

[8]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[9]  Imed Romdhani,et al.  A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[10]  K. J. Ray Liu,et al.  Hierarchical group access control for secure multicast communications , 2007, TNET.

[11]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[12]  P. Parthasarathi,et al.  Weighted Ternary Tree Approach for Secure Group Communication Among Mobile Applications , 2020, Wireless Personal Communications.

[13]  Christian Esposito,et al.  Distributed Group Key Management for Event Notification Confidentiality Among Sensors , 2020, IEEE Transactions on Dependable and Secure Computing.

[14]  Simon J. Shepherd,et al.  A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast , 2015, IEEE Transactions on Mobile Computing.

[15]  Dharma P. Agrawal,et al.  Reduction in control overhead for a secure, scalable framework for mobile multicast , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[16]  Shueng-Han Gary Chan,et al.  Distributed servers approach for large-scale secure multicast , 2002, IEEE J. Sel. Areas Commun..

[17]  Kim-Kwang Raymond Choo,et al.  On cloud security attacks: A taxonomy and intrusion detection and prevention as a service , 2016, J. Netw. Comput. Appl..

[18]  B. B. Zaidan,et al.  Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.

[19]  Miss Laiha Mat Kiah,et al.  Host mobility key management in dynamic secure group communication , 2018, Wirel. Networks.

[20]  Donald F. Towsley,et al.  Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.

[21]  Seung-Woo Seo,et al.  Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..

[22]  Chin-Tser Huang,et al.  Chinese remainder theorem based group key management , 2007, ACM-SE 45.

[23]  R. N. Gorgui-Naguib,et al.  Comment: Determination of P-adic transform bases and lengths , 1985 .

[24]  Jiannong Cao,et al.  Scalable key management for secure multicast communication in the mobile environment , 2006, Pervasive Mob. Comput..

[25]  Hsu-Chun Hsiao,et al.  GroupIt: Lightweight Group Key Management for Dynamic IoT Environments , 2018, IEEE Internet of Things Journal.

[26]  Seung-Woo Seo,et al.  Key Management for Multiple Multicast Groups in Wireless Networks , 2013, IEEE Transactions on Mobile Computing.

[27]  Miss Laiha Mat Kiah,et al.  Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).

[28]  Sushil Jajodia,et al.  Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.

[29]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[30]  Xiong Luo,et al.  Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN , 2019, IEEE Access.

[31]  Yacine Challal,et al.  Key management with host mobility in dynamic groups , 2010, SIN.

[32]  Zhili Sun,et al.  Multi-layers balanced LKH , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[33]  Trust T. Mapoka,et al.  Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .