Skip to main content
Erschienen in: Wireless Personal Communications 1/2014

01.07.2014

Autonomic Group Key Management in Deep Space DTN

verfasst von: Jian Zhou, Meina Song, Junde Song, Xian-wei Zhou, Liyan Sun

Erschienen in: Wireless Personal Communications | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In deep space delay tolerant networks rekeying expend vast amounts of energy and delay time as a reliable end-to-end communication is very difficult to be available between members and key management center. In order to deal with the question, this paper puts forwards an autonomic group key management scheme for deep space DTN, in which a logical key tree based on one-encryption-key multi-decryption-key key protocol is presented. Each leaf node with a secret decryption key corresponds to a network member and each non-leaf node corresponds to a public encryption key generated by all leaf node’s decryption keys that belong to the non-leaf node’s sub tree. In the proposed scheme, each legitimate member has the same capability of modifying public encryption key with himself decryption key as key management center, so rekeying can be fulfilled successfully by a local leaving or joining member in lack of key management center support. In the security aspect, forward security and backward security are guaranteed. In the efficiency aspect, our proposed scheme’s rekeying message cost is half of LKH scheme when a new member joins, furthermore in member leaving event a leaving member makes tradeoff between computation cost and message cost except for rekeying message cost is constant and is not related to network scale. Therefore, our proposed scheme is more suitable for deep space DTN than LKH and the localization of rekeying is realized securely.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Posner, E. C., & Stevens, R. (1984). Deep space communication—past, present, and future. IEEE Communications Magazine, 22, 8–21.CrossRef Posner, E. C., & Stevens, R. (1984). Deep space communication—past, present, and future. IEEE Communications Magazine, 22, 8–21.CrossRef
2.
Zurück zum Zitat Williamson, M. (1998). Deep space communications. IEE Review, 44(3), 119–122.CrossRef Williamson, M. (1998). Deep space communications. IEE Review, 44(3), 119–122.CrossRef
3.
Zurück zum Zitat Cesarone, R. J., Abraham, D. S., & Deutsch, L. J. (2007). Prospects for a next-generation deep-space network. Proceedings of the IEEE, 95(10), 1902–1915.CrossRef Cesarone, R. J., Abraham, D. S., & Deutsch, L. J. (2007). Prospects for a next-generation deep-space network. Proceedings of the IEEE, 95(10), 1902–1915.CrossRef
4.
Zurück zum Zitat Bhasin, K., Hayden, J., & Agre, J. R. (2001). Advanced communication and networking technologies for Mars exploration. In 19th annual AIAA international communications satellite systems conference, Toulouse, France. Bhasin, K., Hayden, J., & Agre, J. R. (2001). Advanced communication and networking technologies for Mars exploration. In 19th annual AIAA international communications satellite systems conference, Toulouse, France.
5.
Zurück zum Zitat Weber, W. J., Cesarone, R. J., & Abraham, D. S. (2006). Transforming the deep space network into the interplanetary network. Acta Astronautica, 58(8), 411–421.CrossRef Weber, W. J., Cesarone, R. J., & Abraham, D. S. (2006). Transforming the deep space network into the interplanetary network. Acta Astronautica, 58(8), 411–421.CrossRef
6.
Zurück zum Zitat Bhasin, K., & Hayden, J. L. (2002). Space Internet architecture and technologies for NASA enterprises. International Journal of Satellite Communications, 20(5), 311–332.CrossRef Bhasin, K., & Hayden, J. L. (2002). Space Internet architecture and technologies for NASA enterprises. International Journal of Satellite Communications, 20(5), 311–332.CrossRef
7.
Zurück zum Zitat Naitong, Z., Hui, L., & Qinyu, Z. (2007). Thought and developing trend in deep space exploration and communication. Journal of Astronautics, 28(4), 786–793. Naitong, Z., Hui, L., & Qinyu, Z. (2007). Thought and developing trend in deep space exploration and communication. Journal of Astronautics, 28(4), 786–793.
8.
Zurück zum Zitat Jianshe, Y. E., Shijie, S., & Rongjun, S. (2010). Research on DTNfor deep space communications. Journal of Astronautics, 11(4), 941–950. Jianshe, Y. E., Shijie, S., & Rongjun, S. (2010). Research on DTNfor deep space communications. Journal of Astronautics, 11(4), 941–950.
9.
Zurück zum Zitat Yu, C., Xin, M., & Lei, Z. (2012). Analysis of protocol of space information network. Computer Technology and development, 22(6), 1–5. Yu, C., Xin, M., & Lei, Z. (2012). Analysis of protocol of space information network. Computer Technology and development, 22(6), 1–5.
10.
Zurück zum Zitat Burleigh, S., Hooke, A., & Torgerson, L. (2003). Delay tolerant networking: An approach to interplanetary internet. IEEE Communications Magazine, 41(6), 128–136.CrossRef Burleigh, S., Hooke, A., & Torgerson, L. (2003). Delay tolerant networking: An approach to interplanetary internet. IEEE Communications Magazine, 41(6), 128–136.CrossRef
11.
Zurück zum Zitat Mohanchur, S., Kaushal, K. S., & Kankar, S. D. (2011). Delay resistant transport protocol for deep space communication. International Journal of Communicaitons, Network and System Sciences, 4, 122–132.CrossRef Mohanchur, S., Kaushal, K. S., & Kankar, S. D. (2011). Delay resistant transport protocol for deep space communication. International Journal of Communicaitons, Network and System Sciences, 4, 122–132.CrossRef
12.
Zurück zum Zitat Roy, C. A., Baras, J. S., Hadjitheodosiou, M., & Rentz, N. (2005). Hybrid networks with a space segment-topology design and security issues. In Military communications conference, 2005 (vol. 3, pp. 1414–1420). MILCOM 2005. IEEE. Roy, C. A., Baras, J. S., Hadjitheodosiou, M., & Rentz, N. (2005). Hybrid networks with a space segment-topology design and security issues. In Military communications conference, 2005 (vol. 3, pp. 1414–1420). MILCOM 2005. IEEE.
13.
Zurück zum Zitat Johann, V. D. M., Dawoud, D., & Tephen, M. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys, 39(1), 1–46.CrossRef Johann, V. D. M., Dawoud, D., & Tephen, M. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys, 39(1), 1–46.CrossRef
14.
Zurück zum Zitat Yacine, C., & Hamida, S. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(2), 105–119. Yacine, C., & Hamida, S. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(2), 105–119.
15.
Zurück zum Zitat Rani, T. P., & Jaya, K. C. (2012). Survey on key pre distribution for security in wireless sensor networks. Lecture Notes of the Institute for Computer Sciences, 84, 248–252. Rani, T. P., & Jaya, K. C. (2012). Survey on key pre distribution for security in wireless sensor networks. Lecture Notes of the Institute for Computer Sciences, 84, 248–252.
16.
Zurück zum Zitat Dandan, L., Runtong, Z., & Chuanchen, W. (2012). Efficient group key management scheme with hierarchy structure. Chinese Journal of Electronics, 1(2), 249–253. Dandan, L., Runtong, Z., & Chuanchen, W. (2012). Efficient group key management scheme with hierarchy structure. Chinese Journal of Electronics, 1(2), 249–253.
17.
Zurück zum Zitat Seba, H., Lagraa, S., & Kheddouci, H. (2012). Alliance-based clustering scheme for group key management in mobile ad hoc networks. Journal of Supercomputing, 61(3), 481–501.CrossRef Seba, H., Lagraa, S., & Kheddouci, H. (2012). Alliance-based clustering scheme for group key management in mobile ad hoc networks. Journal of Supercomputing, 61(3), 481–501.CrossRef
18.
Zurück zum Zitat Juhyung, S., Junsik, L., & Seungwoo, S. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Personal Communications, 52(2), 359–382.CrossRef Juhyung, S., Junsik, L., & Seungwoo, S. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Personal Communications, 52(2), 359–382.CrossRef
19.
Zurück zum Zitat Elisavet, K. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384–393.CrossRef Elisavet, K. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384–393.CrossRef
20.
Zurück zum Zitat Klaoudatou, E., & Konstantinou, E. (2011). A survey on cluster-based group key agreement protocols for WSNs. Communications Surveys and Tutorials, IEEE, 13(3), 429–442.CrossRef Klaoudatou, E., & Konstantinou, E. (2011). A survey on cluster-based group key agreement protocols for WSNs. Communications Surveys and Tutorials, IEEE, 13(3), 429–442.CrossRef
21.
Zurück zum Zitat Zhiwen, W., & Shaozi, Li. (2012). A secure and high-efficient dynamic key management scheme for group communication using optimized GDH. ICIC Express Letters, 6(7), 1815–1820. Zhiwen, W., & Shaozi, Li. (2012). A secure and high-efficient dynamic key management scheme for group communication using optimized GDH. ICIC Express Letters, 6(7), 1815–1820.
22.
Zurück zum Zitat Pen, X., Jingsha, H., & Yingfang, F. (2012). Distributed group key management in wireless mesh networks. International Journal of Security and its Applications, 6(2), 115–120. Pen, X., Jingsha, H., & Yingfang, F. (2012). Distributed group key management in wireless mesh networks. International Journal of Security and its Applications, 6(2), 115–120.
23.
Zurück zum Zitat Suganthi, N., Sumathi, V., & Mohanapriyha, R. S. (2011). Secure group key management for dynamic sensor networks. Journal of Computer Sciences, 7(7), 997–1002. Suganthi, N., Sumathi, V., & Mohanapriyha, R. S. (2011). Secure group key management for dynamic sensor networks. Journal of Computer Sciences, 7(7), 997–1002.
24.
Zurück zum Zitat Yingli, S., Cruickshank, H., Moseley, M., & Ashworth, J. (2011). Security architecture for satellite services over cryptographically heterogeneous networks. In Proceedings of the 2011 6th international ICST conference on communications and networking in China (pp. 1093–1098). Yingli, S., Cruickshank, H., Moseley, M., & Ashworth, J. (2011). Security architecture for satellite services over cryptographically heterogeneous networks. In Proceedings of the 2011 6th international ICST conference on communications and networking in China (pp. 1093–1098).
25.
Zurück zum Zitat Drakakis, K. E., Panagopoulos, A. D., & Cottis, P. G. (2003). Overview of satellite communication networks security: Introduction of EAP. International Journal of Security and Networks, 4(3), 164–170.CrossRef Drakakis, K. E., Panagopoulos, A. D., & Cottis, P. G. (2003). Overview of satellite communication networks security: Introduction of EAP. International Journal of Security and Networks, 4(3), 164–170.CrossRef
26.
Zurück zum Zitat EunJ, Y., KeeY, Y., & Jeong, W. H. (2011). An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP Journal on Wireless Communications and Networking, 86, 1–10. EunJ, Y., KeeY, Y., & Jeong, W. H. (2011). An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP Journal on Wireless Communications and Networking, 86, 1–10.
27.
Zurück zum Zitat Howarth, M. P., Iyengar, S., Sun, Z., & Cruickshank, H. (2004). Dynamics of key management in secure satellite multicast. IEEE Journal on Selected Areas in Communications, 2(2), 308–319.CrossRef Howarth, M. P., Iyengar, S., Sun, Z., & Cruickshank, H. (2004). Dynamics of key management in secure satellite multicast. IEEE Journal on Selected Areas in Communications, 2(2), 308–319.CrossRef
28.
Zurück zum Zitat Arslan, M. G., & Alagöz, F. (2006). Security issues and performance study of key management techniques over satellite links. In 11th international workshop on computer-aided modeling, analysis and design of communication links and networks (pp. 122–128). Arslan, M. G., & Alagöz, F. (2006). Security issues and performance study of key management techniques over satellite links. In 11th international workshop on computer-aided modeling, analysis and design of communication links and networks (pp. 122–128).
29.
Zurück zum Zitat Ahmad, K., Bakhache, B., El, A.S., & Sindian, S. (2012). A scalable key management scheme for secure IP multicast over DVB-S using chaos. In Proceedings of the Mediterranean electrotechnical conference—MELECON (pp. 736–740). Ahmad, K., Bakhache, B., El, A.S., & Sindian, S. (2012). A scalable key management scheme for secure IP multicast over DVB-S using chaos. In Proceedings of the Mediterranean electrotechnical conference—MELECON (pp. 736–740).
30.
Zurück zum Zitat Chung, K. W., Mohamed, G., & Simon, S. (2000). Secure group communications using key graphs. IEEE/Acm Transactions on Networking, 8(1), 31–37.CrossRef Chung, K. W., Mohamed, G., & Simon, S. (2000). Secure group communications using key graphs. IEEE/Acm Transactions on Networking, 8(1), 31–37.CrossRef
31.
Zurück zum Zitat Zhen, W., Xuehui, D., & Yi, S. (2011). Group key management scheme based on proxy re-cryptography for near-space network. International Conference on Network Computing and Information Security, 2011, 52–57. Zhen, W., Xuehui, D., & Yi, S. (2011). Group key management scheme based on proxy re-cryptography for near-space network. International Conference on Network Computing and Information Security, 2011, 52–57.
32.
Zurück zum Zitat Zhong, Y., & Jian-feng, M. (2011). Identity based group key management scheme for LEO/MEO double-layer space information network. Journal of Astronautics, 32(7), 1551–1557. Zhong, Y., & Jian-feng, M. (2011). Identity based group key management scheme for LEO/MEO double-layer space information network. Journal of Astronautics, 32(7), 1551–1557.
33.
Zurück zum Zitat Steiner, M., & Waidner, M. (1996). Diffie–Hellman key distribution extended to groups. In Proceedings of the 3rd ACM symposium on computer and communications security (vol. 1, pp. 31–37). Steiner, M., & Waidner, M. (1996). Diffie–Hellman key distribution extended to groups. In Proceedings of the 3rd ACM symposium on computer and communications security (vol. 1, pp. 31–37).
34.
Zurück zum Zitat Peoples, C., Parr, G., Scotney, B., Moore, A. (2011). Autonomic context-aware management in interplanetary communications systems. IEEE Aerospace and Electronic Systems Magazine, 26(2), 26–33.CrossRef Peoples, C., Parr, G., Scotney, B., Moore, A. (2011). Autonomic context-aware management in interplanetary communications systems. IEEE Aerospace and Electronic Systems Magazine, 26(2), 26–33.CrossRef
35.
Zurück zum Zitat Bokor, E. (2001). Automating operations for NASA’s deep space network (DSN). In Aerospace conference, 2001. IEEE proceedings (vol. 7, pp. 3383–3390). Bokor, E. (2001). Automating operations for NASA’s deep space network (DSN). In Aerospace conference, 2001. IEEE proceedings (vol. 7, pp. 3383–3390).
36.
Zurück zum Zitat Wódczak, M., & Wódczak, M. (2010). Future autonomic cooperative networks. In 2nd international ICST conference on mobile networks and management. MONAMI (pp. 71–78). Wódczak, M., & Wódczak, M. (2010). Future autonomic cooperative networks. In 2nd international ICST conference on mobile networks and management. MONAMI (pp. 71–78).
37.
Zurück zum Zitat Coronado, G.L.C., & PérezL, C. (2011). An autonomous decentralized public key infrastructure. In Proceedings—2011 10th international symposium on autonomous decentralized systems (pp. 409–414). Coronado, G.L.C., & PérezL, C. (2011). An autonomous decentralized public key infrastructure. In Proceedings—2011 10th international symposium on autonomous decentralized systems (pp. 409–414).
38.
Zurück zum Zitat Harney, H., & Muckenhirn, C. (1997). Group key management protocol (GKMP) architecture, RFC 2094. Harney, H., & Muckenhirn, C. (1997). Group key management protocol (GKMP) architecture, RFC 2094.
39.
Zurück zum Zitat Feng, B., Robert, H. D., & Huafei, Z. (2003). Variations of Diffie–Hellman problem. Lecture Notes in Computer Science, 2836(2003), 301–312. Feng, B., Robert, H. D., & Huafei, Z. (2003). Variations of Diffie–Hellman problem. Lecture Notes in Computer Science, 2836(2003), 301–312.
40.
Zurück zum Zitat Jonathan, K., & Yehuda, L. (2007). Introduction to modern cryptography. London: Chapman & Hall/CRC Press. Jonathan, K., & Yehuda, L. (2007). Introduction to modern cryptography. London: Chapman & Hall/CRC Press.
Metadaten
Titel
Autonomic Group Key Management in Deep Space DTN
verfasst von
Jian Zhou
Meina Song
Junde Song
Xian-wei Zhou
Liyan Sun
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1505-1

Weitere Artikel der Ausgabe 1/2014

Wireless Personal Communications 1/2014 Zur Ausgabe

Neuer Inhalt