A Scalable and Adaptive Key Management Protocol for Group Communication | SpringerLink
Skip to main content

A Scalable and Adaptive Key Management Protocol for Group Communication

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2957))

Included in the following conference series:

  • 375 Accesses

Abstract

Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current group members. The bandwidth used for such rekeying operation could be high when the group size is large. The proposed solutions to cope with this limitation, commonly called 1 affects n phenomenon, consist of organizing group members into subgroups that use independent traffic encryption keys. This kind of solutions introduce a new challenge which is the requirement of decrypting and reencrypting multicast messages whenever they pass from one subgroup to another. This is a serious drawback for applications that require real-time communication such as video-conferencing. In order to avoid the systematic decryption / reencryption of messages, we propose in this paper an adaptive solution which structures group members into clusters according to the application requirements in term of synchronization and the membership change behavior in the secure session. Simulation results show that our solution is efficient and more adaptive compared to other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Almeroth, K., Ammar, M.: Collecting and modelling the join/leave behaviour of multicast group members in the Mbone. In: Symposium on High Performance Distributed Computing (1996)

    Google Scholar 

  2. Almeroth, K., Ammar, M.: Multicast group behaviour in the internet’s multicast backbone (Mbone). IEEE communications Magazine (1997)

    Google Scholar 

  3. Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups : One-Way Function Trees and Amortized Initialization. draftbalensongroupkeymgmt- oft-00.txt (February 1999) Internet-Draft

    Google Scholar 

  4. Chaddoud, G., Chrisment, I., Sha, A.: Dynamic Group Communication Security. In: 6th IEEE Symposium on computers and communication (2001)

    Google Scholar 

  5. Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: Analytic Model and Theoritical Constructions (April 2003) Technical Report

    Google Scholar 

  6. Dai, W.: Comparison of popular cryptographic algorithms (2000), http://www.eskimo.com/~weidai/benchmarks.html

  7. Dondeti, L.R., Mukherjee, S., Samal, A.: Comparison of Hierarchical Key Distribution Schemes. In: IEEE Globcom Global Internet Symposium (1999)

    Google Scholar 

  8. Dondeti, L.R., Mukherjee, S., Samal, A.: Survey and Comparison of Secure Group Communication Protocols (1999) Technical Report

    Google Scholar 

  9. Dondeti, L.R., Mukherjee, S., Samal, A.: Scalable secure one to-many group communication using dual encryption. Computer Communications (2000)

    Google Scholar 

  10. Gondran, M., Minoux, M.: Graphs and Algorithms. Wiley-interscience series in discret mathematics edition (1990)

    Google Scholar 

  11. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture (July 1997) RFC 2093

    Google Scholar 

  12. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification (July 1997) RFC (2094)

    Google Scholar 

  13. Mittra, S.: Iolus : A Framework for Scalable Secure Multicasting. ACM SIGCOMM (1997)

    Google Scholar 

  14. Oppliger, R., Albanese, A.: Distributed registration and key distribution (DiRK). In: Proceedings of the 12th International Conference on Information Security IFIP SEC 1996 (1996)

    Google Scholar 

  15. Federal Information Processing Standards Publication. Data Encryption Standard (DES) (December 1993) FIPS PUB 46

    Google Scholar 

  16. Federal Information Processing Standards Publication. Advanced Encryption Standard (AES) (November 2001) FIPS PUB 197

    Google Scholar 

  17. Shiels, C., Garcia-Luna-Aceves, J.J.: KHIP-A scalable protocol for secure multicast routing. ACM SIGCOMM (1999)

    Google Scholar 

  18. Snoeyink, J., Suri, S., Vorghese, G.: A Lower Bound for Multicast Key Distribution. In: IEEE INFOCOM 2001 (2001)

    Google Scholar 

  19. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework : Versatile Group Key Management. IEEE Journal on Selected Areas in Communications (special Issues on Middleware) 17(8), 1614–1631 (1999)

    Article  Google Scholar 

  20. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999) RFC 2627

    Google Scholar 

  21. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. ACM SIGCOMM (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Challall, Y., Bettahar, H., Bouabdallah, A. (2004). A Scalable and Adaptive Key Management Protocol for Group Communication. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds) Wired/Wireless Internet Communications. WWIC 2004. Lecture Notes in Computer Science, vol 2957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24643-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24643-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20954-6

  • Online ISBN: 978-3-540-24643-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics