Skip to main content
Top

2020 | OriginalPaper | Chapter

Key Management Scheme for Secure Group Communication

Authors : Om Pal, Bashir Alam

Published in: Advances in Data and Information Sciences

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multicast or group communication enables the distribution of the content in a one-to-many fashion. In multicast communication, the major challenges are dynamicity of group, forward and backward secrecy of the data. There are issues like single-point failure in centralized Group Key Management (GKM), false participation attack in participatory GKM, member dynamicity in Logical Key Hierarchy, etc. To address the various issues of centralized, participatory and LKH GKM; in this paper, we proposed a Key Management Scheme for Secure Group Communication. In the proposed scheme, network members share the computational load of the server and scheme achieves the forward and backward secrecy. The proposed scheme is well suitable for one-to-many mode communication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference VijayaKumar, P. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368. VijayaKumar, P. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.
2.
go back to reference VijayaKumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralized group key management for secure multicast communication. IET information Security, 8(3). VijayaKumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralized group key management for secure multicast communication. IET information Security, 8(3).
3.
go back to reference Wallner, D. M., Harder, E. J., & Agee, R. C. (1998). Key management for multicast: issues and architectures. Internet Draft Report, Filename: draft-wallner-key-arch-01.txt. Wallner, D. M., Harder, E. J., & Agee, R. C. (1998). Key management for multicast: issues and architectures. Internet Draft Report, Filename: draft-wallner-key-arch-01.txt.
4.
go back to reference Wallner, D., Harder, E., & Agee, R. (1999). Key Management for Multicast: Issues and Architectures. RFC 2627. Wallner, D., Harder, E., & Agee, R. (1999). Key Management for Multicast: Issues and Architectures. RFC 2627.
6.
go back to reference Steiner, M., Tsudik, G., & Waidne, M., Diffie-hellman key distribution extended to group communication. IBM Ziirich Research Laboratory CH-8803 Riischlikon, Switzerland. Steiner, M., Tsudik, G., & Waidne, M., Diffie-hellman key distribution extended to group communication. IBM Ziirich Research Laboratory CH-8803 Riischlikon, Switzerland.
7.
go back to reference Liu, Z., Lai, Y., Ren, X., & Bu, S. (2012). An efficient LKH tree balancing algorithm for group key management. In 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 1003–1005. Liu, Z., Lai, Y., Ren, X., & Bu, S. (2012). An efficient LKH tree balancing algorithm for group key management. In 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 1003–1005.
9.
go back to reference Sherman, A. T., & Mcgrew, D. A. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions On Software Engineering, 29(5). Sherman, A. T., & Mcgrew, D. A. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions On Software Engineering, 29(5).
10.
go back to reference Odelu, V., Das, A. K., & Goswami, A. (2016). A secure effective dynamic group passwordbased authenticated key agreement scheme for the integrated EPR information system. Journal of King Saud University-Computer and Information Sciences, 28(1), 68–81. Odelu, V., Das, A. K., & Goswami, A. (2016). A secure effective dynamic group passwordbased authenticated key agreement scheme for the integrated EPR information system. Journal of King Saud University-Computer and Information Sciences, 28(1), 68–81.
11.
go back to reference Xu, L., & Huang, C. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 577–587.CrossRef Xu, L., & Huang, C. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 577–587.CrossRef
12.
go back to reference Rafaeli, S., & Hutchison, D. (2002). Hydra: a decentralized group key management. In 11th IEEE International WETICE: Enterprise Security Workshop, June 2002. Rafaeli, S., & Hutchison, D. (2002). Hydra: a decentralized group key management. In 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.
13.
go back to reference Hanatani, Y., et al. (2016). Secure multicast group management and key distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing, pp. 227–243. Hanatani, Y., et al. (2016). Secure multicast group management and key distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing, pp. 227–243.
14.
go back to reference Ballardie, A. (1997). Core Based Trees (CBT version 2) Multicast Routing protocol specification”, September 1997. RFC 2189. Ballardie, A. (1997). Core Based Trees (CBT version 2) Multicast Routing protocol specification”, September 1997. RFC 2189.
15.
go back to reference Baddi, Y., & Dafir Ech-Cherif El Kettani, M. (2013). Key management for secure multicast communication: A survey. Security Days (JNS3), 2013 National. IEEE. Baddi, Y., & Dafir Ech-Cherif El Kettani, M. (2013). Key management for secure multicast communication: A survey. Security Days (JNS3), 2013 National. IEEE.
17.
go back to reference Kumar V., Kumar R., & Pandey S. K. (2018) An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem, in third International Conference on Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017). Communications in Computer and Information Science, vol 828. Springer, Singapore, pp. 543–554, https://doi.org/10.1007/978-981-10-8660-1_42. Kumar V., Kumar R., & Pandey S. K. (2018) An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem, in third International Conference on Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017). Communications in Computer and Information Science, vol 828. Springer, Singapore, pp. 543–554, https://​doi.​org/​10.​1007/​978-981-10-8660-1_​42.
18.
go back to reference Sharma, S., & Krishna, C. R. (2015). An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, pp. 687–693. https://doi.org/10.1109/cict.2015.116. Sharma, S., & Krishna, C. R. (2015). An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, pp. 687–693. https://​doi.​org/​10.​1109/​cict.​2015.​116.
20.
go back to reference Adusumilli, P., & Zou, X. (2005). KTDCKM-SDC: a distributed conference key management scheme for secure dynamic conferencing. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). Adusumilli, P., & Zou, X. (2005). KTDCKM-SDC: a distributed conference key management scheme for secure dynamic conferencing. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005).
21.
go back to reference Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE. Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE.
22.
go back to reference Islam, Hafizul, S. K., & Biswas, G. P. (2017). A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University-Computer and Information Sciences, 29(1), 63–73. Islam, Hafizul, S. K., & Biswas, G. P. (2017). A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University-Computer and Information Sciences, 29(1), 63–73.
23.
go back to reference Lin, I.-C., Tang, S.-S., & Wang, C.-M. (2010). Multicast key management without rekeying processes. The Computer Journal, 53(7), 939–950.CrossRef Lin, I.-C., Tang, S.-S., & Wang, C.-M. (2010). Multicast key management without rekeying processes. The Computer Journal, 53(7), 939–950.CrossRef
Metadata
Title
Key Management Scheme for Secure Group Communication
Authors
Om Pal
Bashir Alam
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0694-9_17