Skip to main content

2016 | OriginalPaper | Buchkapitel

Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management

verfasst von : Raja Lavanya, K. Sundarakantham, S. Mercy Shalinie

Erschienen in: Computational Intelligence, Cyber Security and Computational Models

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is an important requirement in reliable group communication over open networks in order to prevent intruder attack. A common secret key called group key is generated for encrypting the group information. A distributed key management methodology based on dynamic decentralized group key agreement protocol is required to handle this issue. Rekeying or new group key generation is based on membership driven or time driven. Rekeying is needed whenever a new single member comes to the group or an existing member goes out. Individual rekeying operations in a large group of users leads to the increase the rate of message exchanges which leads to performance degradation. This paper investigates communication rounds, computation complexity and storage of keys in existing key management schemes and introduces an enhanced decentralized Sub Group Key Management (SGKM) approach which is efficient for rekeying. In the proposed work, a group is fragmented into sub groups and the sub groups are managed with one encryption key and multi decryption key protocol by the respective manager. The performance of proposed algorithm is analyzed under different join and leave possibilities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Park, Y.H., Je, D.H., Park, M.H., Seo, S.W.: Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput. 13(4) (2014) Park, Y.H., Je, D.H., Park, M.H., Seo, S.W.: Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput. 13(4) (2014)
3.
Zurück zum Zitat Park, M.H., Jeong, H.Y., Seo, S.W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput. 12(9) (2013) Park, M.H., Jeong, H.Y., Seo, S.W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput. 12(9) (2013)
4.
Zurück zum Zitat Sherman, A., McGrew, D.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Soft. Eng. 444–458 (2003) Sherman, A., McGrew, D.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Soft. Eng. 444–458 (2003)
5.
Zurück zum Zitat Lin, J.C., Huang, K.H., Lai, F., Lee, H.C.: Secure and efficient group key management with shared key derivation. Comput. Stand Interfaces 31(1), 192–208 (2009)CrossRef Lin, J.C., Huang, K.H., Lai, F., Lee, H.C.: Secure and efficient group key management with shared key derivation. Comput. Stand Interfaces 31(1), 192–208 (2009)CrossRef
6.
Zurück zum Zitat Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)CrossRefMathSciNetMATH Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)CrossRefMathSciNetMATH
7.
Zurück zum Zitat Dandon, L., Runtong, Z., Chuanchen, W.: Efficient group key management scheme with hierarchy structure. Chin. J. Electron. 21(2), 249–253 (2012) Dandon, L., Runtong, Z., Chuanchen, W.: Efficient group key management scheme with hierarchy structure. Chin. J. Electron. 21(2), 249–253 (2012)
8.
Zurück zum Zitat Juhyung, S., Jun, S.L., Seung, W.S.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2012) Juhyung, S., Jun, S.L., Seung, W.S.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2012)
9.
Zurück zum Zitat John, S.P., Samuel, P.: A predictive cluster technique for effective key management in mobile ad hoc networks. Inf. Secur. J. 20(4), 250–260 (2011) John, S.P., Samuel, P.: A predictive cluster technique for effective key management in mobile ad hoc networks. Inf. Secur. J. 20(4), 250–260 (2011)
10.
Zurück zum Zitat Xiao, P., Jingsha, H., Yingfang, F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 478–480 (2012) Xiao, P., Jingsha, H., Yingfang, F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 478–480 (2012)
11.
Zurück zum Zitat Liao, J., Hui, X.L., Qing, Q.P., Yi, L., Yu, M.W.: A public ley encryption scheme with one-encryption and multi-decryption. Chin. J. Comput. 35(5), 1059–1067 (2012) Liao, J., Hui, X.L., Qing, Q.P., Yi, L., Yu, M.W.: A public ley encryption scheme with one-encryption and multi-decryption. Chin. J. Comput. 35(5), 1059–1067 (2012)
13.
Zurück zum Zitat Mittra, S.: Iolus: A framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 288 (1997) Mittra, S.: Iolus: A framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 288 (1997)
Metadaten
Titel
Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management
verfasst von
Raja Lavanya
K. Sundarakantham
S. Mercy Shalinie
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_41