An Efficient Key Management Algorithm for Hierarchical Group Communication

Even though hierarchical group communication is a prominent communication model for a variety of applications, featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements, and then we propose an efficient key management protocol satisfying those requirements. This work is done in the frame of a national french project whose consortium includes the international telecom company EADS, INRIA, CNRS and ENST-Paris. The project is called Safe- Cast and deals with group communication in PMR networks that are used mainly by security corps (police, fire fighters, soldiers, and so forth) in areas where it is difficult to have network infrastructures, such as war battles or following a natural disaster (earthquake, tsunami, tornado, or similar).

[1]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[2]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[3]  Bob Briscoe MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .

[4]  David Hutchison,et al.  Decentralised group key management , 2002 .

[5]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[6]  K. C. Almeroth,et al.  Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .

[7]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[8]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[9]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[10]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[11]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[12]  Bob Briscoe,et al.  MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences , 1999, Networked Group Communication.

[13]  Malibu Canyon RdMalibu Keystone: a Group Key Management Service , 2000 .

[14]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[15]  Danny Dolev,et al.  Optimized Rekey for Group Communication Systems , 2000, NDSS.

[16]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[17]  Colin Boyd,et al.  On Key Agreement and Conference Key Agreement , 1997, ACISP.

[18]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[19]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[20]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.