Skip to main content

2010 | OriginalPaper | Buchkapitel

Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions

verfasst von : Sencun Zhu, Sushil Jajodia

Erschienen in: Network Security

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat S. Banerjee, and B. Bhattacharjee. Scalable Secure Group Communication over IP Multicast. In Proceedings of International Conference on Network Protocols (ICNP) 2001, Riverside, California, November 2001. S. Banerjee, and B. Bhattacharjee. Scalable Secure Group Communication over IP Multicast. In Proceedings of International Conference on Network Protocols (ICNP) 2001, Riverside, California, November 2001.
2.
Zurück zum Zitat D. Balenson, D. McGrew, and A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (work in progress), August 2000. D. Balenson, D. McGrew, and A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (work in progress), August 2000.
3.
Zurück zum Zitat B. Briscoe. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In Proceedings of First International Workshop on Networked Group Communication, NGC 1999. B. Briscoe. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In Proceedings of First International Workshop on Networked Group Communication, NGC 1999.
4.
Zurück zum Zitat R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In Proceedings of IEEE INFOCOM’99, March 1999. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In Proceedings of IEEE INFOCOM’99, March 1999.
5.
Zurück zum Zitat Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture. In Proceedings of ACM SIGCOMM 2001, August 2001. Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture. In Proceedings of ACM SIGCOMM 2001, August 2001.
6.
Zurück zum Zitat Y. Chu, S. Rao, and H. Zhang. A Case for EndSystem Multicast. In Proceedings of ACM Sigmetrics, June 2000. Y. Chu, S. Rao, and H. Zhang. A Case for EndSystem Multicast. In Proceedings of ACM Sigmetrics, June 2000.
7.
Zurück zum Zitat L. Eschenauer, and V. Gligor. A Key-Management Scheme for Distributed Sensor Networks. In Proceedings of ACM CCS 2002. L. Eschenauer, and V. Gligor. A Key-Management Scheme for Distributed Sensor Networks. In Proceedings of ACM CCS 2002.
8.
Zurück zum Zitat S. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. Zhang. A Reliable Multicast Framework for Lightweight Session and Application Layer Framing. IEEE/ACM Transactions on Networking, December 1997. S. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. Zhang. A Reliable Multicast Framework for Lightweight Session and Application Layer Framing. IEEE/ACM Transactions on Networking, December 1997.
9.
Zurück zum Zitat H. Harney, and E. Harder. Logical Key Hierarchy Protocol Internet Draft, draft-harney-sparta-lkhp-sec-00.txt, March 1999. H. Harney, and E. Harder. Logical Key Hierarchy Protocol Internet Draft, draft-harney-sparta-lkhp-sec-00.txt, March 1999.
10.
Zurück zum Zitat D. Halevy, and A. Shamir. The LSD Broadcast Encryption Scheme. In Proceedings of Advances in Cryptology - CRYPTO 2002. D. Halevy, and A. Shamir. The LSD Broadcast Encryption Scheme. In Proceedings of Advances in Cryptology - CRYPTO 2002.
11.
Zurück zum Zitat T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. Secure Multicast Groups on Ad Hoc Networks. In Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), 2003. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. Secure Multicast Groups on Ad Hoc Networks. In Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), 2003.
12.
Zurück zum Zitat D. Liu, P. Ning, and K. Sun. Efficient Self-Healing Group Key Distribution with Revocation Capability. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), pp. 231–240, Washington, DC, October 2003. D. Liu, P. Ning, and K. Sun. Efficient Self-Healing Group Key Distribution with Revocation Capability. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), pp. 231–240, Washington, DC, October 2003.
13.
Zurück zum Zitat L. Lazos, and R. Poovendran. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In Proceedings of IEEE ICASSP’03, Hong Kong, China, April 2003. L. Lazos, and R. Poovendran. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In Proceedings of IEEE ICASSP’03, Hong Kong, China, April 2003.
14.
Zurück zum Zitat J. Lin, and S. Paul. RMTP: A Reliable Multicast Transport Protocol, In Proceedings of IEEE INFOCOM’96, March 1996. J. Lin, and S. Paul. RMTP: A Reliable Multicast Transport Protocol, In Proceedings of IEEE INFOCOM’96, March 1996.
15.
Zurück zum Zitat A. Mcauley. Reliable Broadband Communications Using a Burst Erasure Correcting Code. In Proceedings of ACM SIGCOMM’90, Philadelphia, PA, September 1990. A. Mcauley. Reliable Broadband Communications Using a Burst Erasure Correcting Code. In Proceedings of ACM SIGCOMM’90, Philadelphia, PA, September 1990.
16.
Zurück zum Zitat D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology - CRYPTO 2001, LNCS 2139, pp. 41–62, Springer, 2001. D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology - CRYPTO 2001, LNCS 2139, pp. 41–62, Springer, 2001.
17.
Zurück zum Zitat A. Perrig, D. Song, and D. Tygar. ELK, a new protocol for efficient large-group key distribution. In Proceedings of the IEEE Symposium on Security and Privacy 2001, Oakland, CA, May 2001. A. Perrig, D. Song, and D. Tygar. ELK, a new protocol for efficient large-group key distribution. In Proceedings of the IEEE Symposium on Security and Privacy 2001, Oakland, CA, May 2001.
18.
Zurück zum Zitat S. Setia, S. Koussih, S. Jajodia, and E. Harder. Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000. S. Setia, S. Koussih, S. Jajodia, and E. Harder. Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
19.
Zurück zum Zitat J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean. Self-Healing Key Distribution with Revocation. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002. J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean. Self-Healing Key Distribution with Revocation. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
20.
Zurück zum Zitat A. Selcuk, C. McCubbin, and D. Sidhu. Probabilistic Optimization of LKH-based Multicast Key Distribution Schemes. Draft-selcuk-probabilistic-lkh-01.txt, Internet Draft, January 2000. A. Selcuk, C. McCubbin, and D. Sidhu. Probabilistic Optimization of LKH-based Multicast Key Distribution Schemes. Draft-selcuk-probabilistic-lkh-01.txt, Internet Draft, January 2000.
21.
Zurück zum Zitat S. Setia, S. Zhu, and S. Jajodia. A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. In Performance Evaluation, 49(1/4):21–41, 2002. Special issue Proceedings of Performance 2002, Rome, Italy, September 2002. S. Setia, S. Zhu, and S. Jajodia. A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. In Performance Evaluation, 49(1/4):21–41, 2002. Special issue Proceedings of Performance 2002, Rome, Italy, September 2002.
22.
Zurück zum Zitat C. Wong, M. Gouda, and S. Lam. Secure Group Communication Using Key Graphs. In Proceedings of SIGCOMM 1998, pp. 68–79, Vancouver, British Columbia. C. Wong, M. Gouda, and S. Lam. Secure Group Communication Using Key Graphs. In Proceedings of SIGCOMM 1998, pp. 68–79, Vancouver, British Columbia.
23.
Zurück zum Zitat D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architecture. Internet Draft, draft-wallner-key-arch-01.txt, September 1998. D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architecture. Internet Draft, draft-wallner-key-arch-01.txt, September 1998.
25.
Zurück zum Zitat Y. Yang, X. Li, X. Zhang, and S. Lam. Reliable group rekeying: Design and Performance Analysis. In Proceedings of ACM SIGCOMM 2001, pp. 27–38, San Diego, CA, USA, August 2001. Y. Yang, X. Li, X. Zhang, and S. Lam. Reliable group rekeying: Design and Performance Analysis. In Proceedings of ACM SIGCOMM 2001, pp. 27–38, San Diego, CA, USA, August 2001.
26.
Zurück zum Zitat S. Zhu, S. Setia, and S. Jajodia. Performance Optimizations for Group Key Management Schemes. In Proceedings of the 23rd IEEE ICDCS 2003, Providence, RI, May 2003. S. Zhu, S. Setia, and S. Jajodia. Performance Optimizations for Group Key Management Schemes. In Proceedings of the 23rd IEEE ICDCS 2003, Providence, RI, May 2003.
27.
Zurück zum Zitat S. Zhu, S. Setia, and S. Jajodia. Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. In Proceedings of 5th International Workshop on Networked Group Communications (NGC 2003), Germany, September 2003. S. Zhu, S. Setia, and S. Jajodia. Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. In Proceedings of 5th International Workshop on Networked Group Communications (NGC 2003), Germany, September 2003.
28.
Zurück zum Zitat S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), Washington, DC, October 2003. S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’03), Washington, DC, October 2003.
29.
Zurück zum Zitat S. Zhu, S. Setia, S. Xu, and S. Jajodia. GKMPAN: An Efficient Group Key Management Scheme for Secure Multicast in Ad-hoc Networks. In Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems (Mobiquitous’04), Boston, Massachusetts, August 22–25, 2004. S. Zhu, S. Setia, S. Xu, and S. Jajodia. GKMPAN: An Efficient Group Key Management Scheme for Secure Multicast in Ad-hoc Networks. In Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems (Mobiquitous’04), Boston, Massachusetts, August 22–25, 2004.
30.
Zurück zum Zitat S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP’03), Atlanta, Georgia, November 4–7, 2003. S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP’03), Atlanta, Georgia, November 4–7, 2003.
Metadaten
Titel
Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions
verfasst von
Sencun Zhu
Sushil Jajodia
Copyright-Jahr
2010
Verlag
Springer US
DOI
https://doi.org/10.1007/978-0-387-73821-5_3

Premium Partner