Skip to main content
Erschienen in: Wireless Networks 4/2014

01.05.2014

Huddle hierarchy based group key management protocol using gray code

verfasst von: R. Varalakshmi, V. Rhymend Uthariaraj

Erschienen in: Wireless Networks | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure and reliable group communication is an active area of research. Its popularity is fuelled by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management. The present paper is based on the huddle hierarchy based secure multicast group key management scheme using the most popular absolute encoder output type code named gray code. The focus is of twofolds. The first fold deals with the reduction of computation complexity which is achieved in this protocol by performing fewer multiplication operations during the key updating process. To optimize the number of multiplication operations, the fast Fourier transform, divide and conquer approach for multiplication of polynomial representation of integers, is used in this proposed work. The second fold aims at reducing the amount of information stored in the Group Center and group members while performing the update operation in the key content. Comparative analysis to illustrate the performance of various key distribution protocols is shown in this paper and it has been observed that this proposed algorithm reduces the computation and storage complexity significantly.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wallner, D. M., Harder, E. J., & Agee, R. C. (1997). Key management for multicast: issues and architectures. Informational RFC, draft-Wallnerkey-arch-ootxt, July 1997. Wallner, D. M., Harder, E. J., & Agee, R. C. (1997). Key management for multicast: issues and architectures. Informational RFC, draft-Wallnerkey-arch-ootxt, July 1997.
2.
Zurück zum Zitat Chang, I., Engel, R., Kandlur, D., Pendarakis, D., & Daha, D. (1999). Key management for secure internet multicast using Boolean function minimization technique. In ACM SIGCOMM’99, March 1999. Chang, I., Engel, R., Kandlur, D., Pendarakis, D., & Daha, D. (1999). Key management for secure internet multicast using Boolean function minimization technique. In ACM SIGCOMM’99, March 1999.
3.
Zurück zum Zitat Varalakshmi, R., & Uthariaraj, V. R. (2011). A new secure multicast group key management using gray code. Paper no: 978-1-4577-0590-8/11. In IEEE-international conference on recent trends in information technology, ICRTIT 2011, MIT, Anna University, Chennai, June 3–5, 2011. Varalakshmi, R., & Uthariaraj, V. R. (2011). A new secure multicast group key management using gray code. Paper no: 978-1-4577-0590-8/11. In IEEE-international conference on recent trends in information technology, ICRTIT 2011, MIT, Anna University, Chennai, June 3–5, 2011.
4.
Zurück zum Zitat Li, M., Poovendran, R., & McGrew, D. A. (2004). Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Information Processing Letters, 93, 191–198.CrossRefMathSciNet Li, M., Poovendran, R., & McGrew, D. A. (2004). Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Information Processing Letters, 93, 191–198.CrossRefMathSciNet
5.
Zurück zum Zitat Poovendran, R., & Baras, J. S. (2001). An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 47, 2824–2834.CrossRefMATHMathSciNet Poovendran, R., & Baras, J. S. (2001). An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 47, 2824–2834.CrossRefMATHMathSciNet
6.
Zurück zum Zitat Kulkarni, S. S., & Bruhadeshwar, B. (2010). Key-update distribution in secure group communication. Computer Communications, 33(6), 689–705.CrossRef Kulkarni, S. S., & Bruhadeshwar, B. (2010). Key-update distribution in secure group communication. Computer Communications, 33(6), 689–705.CrossRef
7.
Zurück zum Zitat Bruhadeshwar, B., Kothapalli, K., & Deepya, M. S. (2009). Reducing the cost of session key establishment. In ARES (2009), pp. 369–373. Bruhadeshwar, B., Kothapalli, K., & Deepya, M. S. (2009). Reducing the cost of session key establishment. In ARES (2009), pp. 369–373.
8.
Zurück zum Zitat Bruhadeshwar, B., Kothapalli, K., Poornima, M., & Divya, M. (2009). Routing protocol security using symmetric key based techniques. In ARES (2009), pp. 193–200. Bruhadeshwar, B., Kothapalli, K., Poornima, M., & Divya, M. (2009). Routing protocol security using symmetric key based techniques. In ARES (2009), pp. 193–200.
9.
Zurück zum Zitat Wang, S.-J., Tsai, Y.-R., Shen, C.-C., & Chen, P.-Y. (2010). Hierarchical key derivation scheme for group-oriented communication systems. International Journal of Information Technology, Communications and Convergence, 1(1), 66–76.CrossRef Wang, S.-J., Tsai, Y.-R., Shen, C.-C., & Chen, P.-Y. (2010). Hierarchical key derivation scheme for group-oriented communication systems. International Journal of Information Technology, Communications and Convergence, 1(1), 66–76.CrossRef
10.
Zurück zum Zitat Imani, M., Taheri, M., & Naderi, M. (2010). Security enhanced routing protocol for ad hoc networks. Journal of Convergence, 1(1), 43–48. Imani, M., Taheri, M., & Naderi, M. (2010). Security enhanced routing protocol for ad hoc networks. Journal of Convergence, 1(1), 43–48.
11.
Zurück zum Zitat Wong, C., Gouda, M., & Lam, S. (2002). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef Wong, C., Gouda, M., & Lam, S. (2002). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.CrossRef
12.
Zurück zum Zitat Blaum, M., Bruck, J., & Vardy, A. (1996). MDS array codes with independent parity symbols. IEEE Transactions on Information Theory, 42(2), 529–542.CrossRefMATHMathSciNet Blaum, M., Bruck, J., & Vardy, A. (1996). MDS array codes with independent parity symbols. IEEE Transactions on Information Theory, 42(2), 529–542.CrossRefMATHMathSciNet
13.
Zurück zum Zitat Trappe, W., & Lawrence, C. (2007). Introduction to cryptography with coding theory (2nd ed., pp. 66–70). Washington: Pearson Education. Trappe, W., & Lawrence, C. (2007). Introduction to cryptography with coding theory (2nd ed., pp. 66–70). Washington: Pearson Education.
14.
Zurück zum Zitat Lihao, Xu, & Huang, Cheng. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 1–10.CrossRef Lihao, Xu, & Huang, Cheng. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 1–10.CrossRef
15.
Zurück zum Zitat Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th international conference on computational and mathematical methods in science and engineering, CMMSE, 703–713. Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th international conference on computational and mathematical methods in science and engineering, CMMSE, 703–713.
16.
Zurück zum Zitat Trappe, W., Song, J., Radha Poovendran, K. J., & Liu, R. (2001). Key distribution for secure multimedia multicasts via data embedding. IEEE International Conference on Acoustics, Speech, and Signal Processing, 3, 1449–1452. Trappe, W., Song, J., Radha Poovendran, K. J., & Liu, R. (2001). Key distribution for secure multimedia multicasts via data embedding. IEEE International Conference on Acoustics, Speech, and Signal Processing, 3, 1449–1452.
17.
Zurück zum Zitat Lee, J. S., Son, J. H., Park, Y. H., & Seo, S. W. (2008). Optimal level-homogeneous tree structure for logical key hierarchy. In: Proceedings of IEEE conference on communication system software and middleware workshop, COMSWARE. Lee, J. S., Son, J. H., Park, Y. H., & Seo, S. W. (2008). Optimal level-homogeneous tree structure for logical key hierarchy. In: Proceedings of IEEE conference on communication system software and middleware workshop, COMSWARE.
18.
Zurück zum Zitat Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33(6), 136–148.CrossRef Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33(6), 136–148.CrossRef
19.
Zurück zum Zitat McGrew, A. D., & Sherman, A. T. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5), 444–458.CrossRef McGrew, A. D., & Sherman, A. T. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5), 444–458.CrossRef
20.
Zurück zum Zitat Trappe, W., Song, J., Poovendran, R., & Liu, K. J. R. (2003). Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia, 5(4), 544–557.CrossRef Trappe, W., Song, J., Poovendran, R., & Liu, K. J. R. (2003). Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia, 5(4), 544–557.CrossRef
21.
Zurück zum Zitat Vijayakumar, P., Bose, S., & Kannan A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368. Vijayakumar, P., Bose, S., & Kannan A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.
22.
Zurück zum Zitat Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007). Dynamic balanced key tree management for secure multicast communications. IEEE Transactions on Computers, 56(5), 590–605.CrossRefMathSciNet Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007). Dynamic balanced key tree management for secure multicast communications. IEEE Transactions on Computers, 56(5), 590–605.CrossRefMathSciNet
23.
24.
Zurück zum Zitat Scott, M. (1990). An implementation of the fast-Fourier multiplication algorithm. Technical report CA-0790, Dublin City University. Scott, M. (1990). An implementation of the fast-Fourier multiplication algorithm. Technical report CA-0790, Dublin City University.
25.
Zurück zum Zitat Denis, T. S. (2003). BigNum math implementing cryptographic multiple precision arithmetic. Rockland, MA: SYNGRESS Publishing. Denis, T. S. (2003). BigNum math implementing cryptographic multiple precision arithmetic. Rockland, MA: SYNGRESS Publishing.
26.
Zurück zum Zitat Singleton, R. C. (1967). On computing the fast Fourier transform. Communications of the AGM, 10, 647–654.MATHMathSciNet Singleton, R. C. (1967). On computing the fast Fourier transform. Communications of the AGM, 10, 647–654.MATHMathSciNet
Metadaten
Titel
Huddle hierarchy based group key management protocol using gray code
verfasst von
R. Varalakshmi
V. Rhymend Uthariaraj
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2014
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-013-0631-8

Weitere Artikel der Ausgabe 4/2014

Wireless Networks 4/2014 Zur Ausgabe

Neuer Inhalt