The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - Sept. (2013 vol.12)
pp: 1712-1723
Min-Ho Park , Carnegie Mellon University, Pittsburgh
Young-Hoon Park , Seoul National University, Seoul
Han-You Jeong , Pusan National University, Pusan
Seung-Woo Seo , Seoul National University, Seoul
ABSTRACT
With the emergence of diverse group-based services, multiple multicast groups are likely to coexist in a single network, and users may subscribe to multiple groups simultaneously. However, the existing group key management (GKM) schemes, aiming to secure communication within a single group, are not suitable in multiple multicast group environments because of inefficient use of keys, and much larger rekeying overheads. In this paper, we propose a new GKM scheme for multiple multicast groups, called the master-key-encryption-based multiple group key management (MKE-MGKM) scheme. The MKE-MGKM scheme exploits asymmetric keys, i.e., a master key and multiple slave keys, which are generated from the proposed master key encryption (MKE) algorithm and is used for efficient distribution of the group key. It alleviates the rekeying overhead by using the asymmetry of the master and slave keys, i.e., even if one of the slave keys is updated, the remaining ones can still be unchanged by modifying only the master key. Through numerical analysis and simulations, it is shown that the MKE-MGKM scheme can reduce the storage overhead of a key distribution center (KDC) by 75 percent and the storage overhead of a user by up to 85 percent, and 60 percent of the communication overhead at most, compared to the existing schemes.
INDEX TERMS
Encryption, Public key, Wireless networks, Mobile computing, Educational institutions, Access control, master key encryption, Security, group key management, multicast, chinese remainder theorem
CITATION
Min-Ho Park, Young-Hoon Park, Han-You Jeong, Seung-Woo Seo, "Key Management for Multiple Multicast Groups in Wireless Networks", IEEE Transactions on Mobile Computing, vol.12, no. 9, pp. 1712-1723, Sept. 2013, doi:10.1109/TMC.2012.135
REFERENCES
[1] IEEE Standard 802.16-2004, Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE, 2004.
[2] Third Generation Partnership Project, "Multimedia Broadcast/Multicast Service; Stage 1 (Release 8)," Technical Specification 3GPP TS 22.146 v.8.3.0 (2007-06), June 2007.
[3] C.K. Wong, M.G. Gouda, and S.S. Lam, "Secure Group Communications Using key Graphs," ACM SIGCOMM Computer Comm. Rev., vol. 28, pp. 68-79, 1998.
[4] D.M. Wallner, E.J. Harder, and R.C. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, http://www.ietf.org/rfcrfc2627.txt, June 1999.
[5] Y. Challal and H. Seba, "Group Key Management Protocols: A Novel Taxonomy," Int'l J. Information Technology, vol. 2, no. 1, pp. 105-118, 2005.
[6] S. McGrew, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
[7] J.-C. Lin, F. Lai, and H.-C. Lee, "Efficient Group Key Management Protocol with One-Way Key Derivation," Proc. IEEE Conf. Local Computer Networks, pp. 336-343, http://doi.ieeecomputersociety. org/10.1109 LCN.2005.61, 2005.
[8] Y. Sun and K.J.R. Liu, "Hierarchical Group Access Control for Secure Multicast Communications," IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1514-1526, Dec. 2007.
[9] Q. Zhang and Y. Wang, "A Centralized Key Management Scheme for Hierarchical Access Control," Proc. IEEE GLOBECOM, pp. 2067-2071, 2004.
[10] D. Wallner, E. Harder, and R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, 1999.
[11] R.L. Rivest, A. Shamir, and L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
[12] K. Koyama, "A Master Key for the RSA Public-Key Cryptosystem," IEICE Trans. Information and Systems, pp. 163-170, 1982.
[13] A. Kondracki, "The Chinese Remainder Theorem," Formalized Math., vol. 6, no. 4, pp. 573-577, 1997.
[14] L.R. Yu and L.B. Luo, "The Generalization of the Chinese Remainder Theorem," Springer Acta Mathematica Sinica, vol. 18, no. 3, pp. 531-538, 2002.
[15] X. Zou, B. Ramamurthy, and S.S. Magliveras, "Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication," Proc. Third Int'l Conf. Information and Comm. Security, pp. 381-385, 2001.
[16] X. Zheng, C.-T. Huang, and M.M. Matthews, "Chinese Remainder Theorem Based Group Key Management," Proc. ACM Southeast Regional Conf., D. John and S.N. Kerr, eds., pp. 266-271, 2007.
[17] G. Caronni, M. Waldvogel, D. Sun, N. Weiler, and B. Plattner, "The VersaKey Framework: Versatile Group Key Management," IEEE J. Selected Areas in Comm., vol. 17, no. 9, pp. 1614-1631, Sept. 1999.
[18] Y. Kim, A. Perrig, and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups," Proc. Seventh ACM Conf. Computer and Comm. Security (SIGSAC '00), 2000.
[19] H. Lu, "A Novel High-Order Tree for Secure Multicast Key Management," IEEE Trans. Computers, vol. 54, no. 2, pp. 214-224, Feb. 2005.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool