Abstract
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current group members. The bandwidth used for such rekeying operation could be high when the group size is large. The proposed solutions to cope with this limitation, commonly called 1 affects n phenomenon, consist of organizing group members into subgroups that use independent traffic encryption keys. This kind of solutions introduce a new challenge which is the requirement of decrypting and reencrypting multicast messages whenever they pass from one subgroup to another. This is a serious drawback for applications that require real-time communication such as video-conferencing. In order to avoid the systematic decryption / reencryption of messages, we propose in this paper an adaptive solution which structures group members into clusters according to the application requirements in term of synchronization and the membership change behavior in the secure session. Simulation results show that our solution is efficient and more adaptive compared to other schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Almeroth, K., Ammar, M.: Collecting and modelling the join/leave behaviour of multicast group members in the Mbone. In: Symposium on High Performance Distributed Computing (1996)
Almeroth, K., Ammar, M.: Multicast group behaviour in the internet’s multicast backbone (Mbone). IEEE communications Magazine (1997)
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups : One-Way Function Trees and Amortized Initialization. draftbalensongroupkeymgmt- oft-00.txt (February 1999) Internet-Draft
Chaddoud, G., Chrisment, I., Sha, A.: Dynamic Group Communication Security. In: 6th IEEE Symposium on computers and communication (2001)
Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: Analytic Model and Theoritical Constructions (April 2003) Technical Report
Dai, W.: Comparison of popular cryptographic algorithms (2000), http://www.eskimo.com/~weidai/benchmarks.html
Dondeti, L.R., Mukherjee, S., Samal, A.: Comparison of Hierarchical Key Distribution Schemes. In: IEEE Globcom Global Internet Symposium (1999)
Dondeti, L.R., Mukherjee, S., Samal, A.: Survey and Comparison of Secure Group Communication Protocols (1999) Technical Report
Dondeti, L.R., Mukherjee, S., Samal, A.: Scalable secure one to-many group communication using dual encryption. Computer Communications (2000)
Gondran, M., Minoux, M.: Graphs and Algorithms. Wiley-interscience series in discret mathematics edition (1990)
Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture (July 1997) RFC 2093
Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification (July 1997) RFC (2094)
Mittra, S.: Iolus : A Framework for Scalable Secure Multicasting. ACM SIGCOMM (1997)
Oppliger, R., Albanese, A.: Distributed registration and key distribution (DiRK). In: Proceedings of the 12th International Conference on Information Security IFIP SEC 1996 (1996)
Federal Information Processing Standards Publication. Data Encryption Standard (DES) (December 1993) FIPS PUB 46
Federal Information Processing Standards Publication. Advanced Encryption Standard (AES) (November 2001) FIPS PUB 197
Shiels, C., Garcia-Luna-Aceves, J.J.: KHIP-A scalable protocol for secure multicast routing. ACM SIGCOMM (1999)
Snoeyink, J., Suri, S., Vorghese, G.: A Lower Bound for Multicast Key Distribution. In: IEEE INFOCOM 2001 (2001)
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework : Versatile Group Key Management. IEEE Journal on Selected Areas in Communications (special Issues on Middleware) 17(8), 1614–1631 (1999)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architecture. National Security Agency (June 1999) RFC 2627
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. ACM SIGCOMM (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Challall, Y., Bettahar, H., Bouabdallah, A. (2004). A Scalable and Adaptive Key Management Protocol for Group Communication. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds) Wired/Wireless Internet Communications. WWIC 2004. Lecture Notes in Computer Science, vol 2957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24643-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-24643-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20954-6
Online ISBN: 978-3-540-24643-5
eBook Packages: Springer Book Archive