Skip to main content
Top

2016 | OriginalPaper | Chapter

Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management

Authors : Raja Lavanya, K. Sundarakantham, S. Mercy Shalinie

Published in: Computational Intelligence, Cyber Security and Computational Models

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is an important requirement in reliable group communication over open networks in order to prevent intruder attack. A common secret key called group key is generated for encrypting the group information. A distributed key management methodology based on dynamic decentralized group key agreement protocol is required to handle this issue. Rekeying or new group key generation is based on membership driven or time driven. Rekeying is needed whenever a new single member comes to the group or an existing member goes out. Individual rekeying operations in a large group of users leads to the increase the rate of message exchanges which leads to performance degradation. This paper investigates communication rounds, computation complexity and storage of keys in existing key management schemes and introduces an enhanced decentralized Sub Group Key Management (SGKM) approach which is efficient for rekeying. In the proposed work, a group is fragmented into sub groups and the sub groups are managed with one encryption key and multi decryption key protocol by the respective manager. The performance of proposed algorithm is analyzed under different join and leave possibilities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Park, Y.H., Je, D.H., Park, M.H., Seo, S.W.: Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput. 13(4) (2014) Park, Y.H., Je, D.H., Park, M.H., Seo, S.W.: Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput. 13(4) (2014)
3.
go back to reference Park, M.H., Jeong, H.Y., Seo, S.W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput. 12(9) (2013) Park, M.H., Jeong, H.Y., Seo, S.W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput. 12(9) (2013)
4.
go back to reference Sherman, A., McGrew, D.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Soft. Eng. 444–458 (2003) Sherman, A., McGrew, D.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Soft. Eng. 444–458 (2003)
5.
go back to reference Lin, J.C., Huang, K.H., Lai, F., Lee, H.C.: Secure and efficient group key management with shared key derivation. Comput. Stand Interfaces 31(1), 192–208 (2009)CrossRef Lin, J.C., Huang, K.H., Lai, F., Lee, H.C.: Secure and efficient group key management with shared key derivation. Comput. Stand Interfaces 31(1), 192–208 (2009)CrossRef
6.
go back to reference Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)CrossRefMathSciNetMATH Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)CrossRefMathSciNetMATH
7.
go back to reference Dandon, L., Runtong, Z., Chuanchen, W.: Efficient group key management scheme with hierarchy structure. Chin. J. Electron. 21(2), 249–253 (2012) Dandon, L., Runtong, Z., Chuanchen, W.: Efficient group key management scheme with hierarchy structure. Chin. J. Electron. 21(2), 249–253 (2012)
8.
go back to reference Juhyung, S., Jun, S.L., Seung, W.S.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2012) Juhyung, S., Jun, S.L., Seung, W.S.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2012)
9.
go back to reference John, S.P., Samuel, P.: A predictive cluster technique for effective key management in mobile ad hoc networks. Inf. Secur. J. 20(4), 250–260 (2011) John, S.P., Samuel, P.: A predictive cluster technique for effective key management in mobile ad hoc networks. Inf. Secur. J. 20(4), 250–260 (2011)
10.
go back to reference Xiao, P., Jingsha, H., Yingfang, F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 478–480 (2012) Xiao, P., Jingsha, H., Yingfang, F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 478–480 (2012)
11.
go back to reference Liao, J., Hui, X.L., Qing, Q.P., Yi, L., Yu, M.W.: A public ley encryption scheme with one-encryption and multi-decryption. Chin. J. Comput. 35(5), 1059–1067 (2012) Liao, J., Hui, X.L., Qing, Q.P., Yi, L., Yu, M.W.: A public ley encryption scheme with one-encryption and multi-decryption. Chin. J. Comput. 35(5), 1059–1067 (2012)
13.
go back to reference Mittra, S.: Iolus: A framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 288 (1997) Mittra, S.: Iolus: A framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 288 (1997)
Metadata
Title
Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management
Authors
Raja Lavanya
K. Sundarakantham
S. Mercy Shalinie
Copyright Year
2016
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_41

Premium Partner