Rotation based secure multicast key management for batch rekeying operations

Many emerging security-rich network applications such as pay-per-view, video broadcasting, video on demand and videoconferencing are based on multicast communication. Thus, securing multicast communications is an important Internet design issue in most of the network applications. In such a scenario providing high security for multicast group members using a common group key is a challenging task. Most of the previous literature describes key tree approaches to distribute the multicast group key in which the rekeying cost is high for batch joining or leaving operations. The marking algorithms proposed in the past focus on batch join and batch leave requests. However, merging and batch balanced algorithms consider batch join more and do not focus much on batch leave operations. In this paper, we present rotation based key tree algorithms to make the tree balanced even when batch leave requests are more than batch joins operations. These proposed algorithms not only maintain a balanced key tree, but also reduce the rekeying costs in comparison with the existing algorithms when batch leave operation is higher than batch join operation (JM < LM). Our simulation result shows that this proposed scheme reduces 20%–30% rekeying cost compared to the existing approaches.

[1]  Arputharaj Kannan,et al.  A Secure Key Distribution Protocol for Multicast Communication , 2011 .

[2]  Haitham S. Cruickshank,et al.  Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..

[3]  Mark Allen Weiss,et al.  Data structures and algorithm analysis in Ada , 1993 .

[4]  Kishore Kothapalli,et al.  Routing Protocol Security Using Symmetric Key Based Techniques , 2009, 2009 International Conference on Availability, Reliability and Security.

[5]  Seung-Woo Seo,et al.  Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..

[6]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[7]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[8]  K. J. Ray Liu,et al.  Key management and distribution for secure multimedia multicast , 2003, IEEE Trans. Multim..

[9]  David K. Y. Yau,et al.  Distributed collaborative key agreement protocols for dynamic peer groups , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[10]  Sandeep S. Kulkarni,et al.  Balancing Revocation and Storage Trade-Offs in Secure Group Communication , 2011, IEEE Transactions on Dependable and Secure Computing.

[11]  Francisco Rico-Novella,et al.  Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[12]  Sandeep S. Kulkarni,et al.  Key-update distribution in secure group communication , 2010, Comput. Commun..

[13]  Yang Richard Yang,et al.  Protocol design for scalable and reliable group rekeying , 2001, TNET.

[14]  Cheng Huang,et al.  Computation-Efficient Multicast Key Distribution , 2008, IEEE Transactions on Parallel and Distributed Systems.

[15]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[16]  Mahalingam Ramkumar The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme , 2010, IEEE Transactions on Information Forensics and Security.

[17]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[18]  Jin-Hee Cho,et al.  On optimal batch rekeying for secure group communications in wireless networks , 2008, Wirel. Networks.

[19]  Kishore Kothapalli,et al.  A Family of Collusion Resistant Symmetric Key Protocols for Authentication , 2008, ICDCN.

[20]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[21]  Kishore Kothapalli,et al.  Reducing the Cost of Session Key Establishment , 2009, 2009 International Conference on Availability, Reliability and Security.

[22]  Mark Allen Weiss,et al.  Data structures and algorithm analysis , 1991 .

[23]  S. Siva Subramanian,et al.  An effective key distribution protocol for secure multicast communication , 2010, ICoAC 2010.

[24]  Haitham S. Cruickshank,et al.  Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.