Abstract
Multicast or group communication enables the distribution of the content in a one-to-many fashion. In multicast communication, the major challenges are dynamicity of group, forward and backward secrecy of the data. There are issues like single-point failure in centralized Group Key Management (GKM), false participation attack in participatory GKM, member dynamicity in Logical Key Hierarchy, etc. To address the various issues of centralized, participatory and LKH GKM; in this paper, we proposed a Key Management Scheme for Secure Group Communication. In the proposed scheme, network members share the computational load of the server and scheme achieves the forward and backward secrecy. The proposed scheme is well suitable for one-to-many mode communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
VijayaKumar, P. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.
VijayaKumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralized group key management for secure multicast communication. IET information Security, 8(3).
Wallner, D. M., Harder, E. J., & Agee, R. C. (1998). Key management for multicast: issues and architectures. Internet Draft Report, Filename: draft-wallner-key-arch-01.txt.
Wallner, D., Harder, E., & Agee, R. (1999). Key Management for Multicast: Issues and Architectures. RFC 2627.
Kumar, V., Kumar, R., & Pandey, S. K. (2018). A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. Journal of King Saud University Information Sciences. https://doi.org/10.1016/j.jksuci.2017.12.014.
Steiner, M., Tsudik, G., & Waidne, M., Diffie-hellman key distribution extended to group communication. IBM Ziirich Research Laboratory CH-8803 Riischlikon, Switzerland.
Liu, Z., Lai, Y., Ren, X., & Bu, S. (2012). An efficient LKH tree balancing algorithm for group key management. In 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 1003–1005.
Kumar, V., Kumar, R. & Pandey, S. K. (2018). Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. International Journal of Information Technology, pp. 1–6. https://doi.org/10.1007/s41870-018-0140-1.
Sherman, A. T., & Mcgrew, D. A. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions On Software Engineering, 29(5).
Odelu, V., Das, A. K., & Goswami, A. (2016). A secure effective dynamic group passwordbased authenticated key agreement scheme for the integrated EPR information system. Journal of King Saud University-Computer and Information Sciences, 28(1), 68–81.
Xu, L., & Huang, C. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 577–587.
Rafaeli, S., & Hutchison, D. (2002). Hydra: a decentralized group key management. In 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.
Hanatani, Y., et al. (2016). Secure multicast group management and key distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing, pp. 227–243.
Ballardie, A. (1997). Core Based Trees (CBT version 2) Multicast Routing protocol specification”, September 1997. RFC 2189.
Baddi, Y., & Dafir Ech-Cherif El Kettani, M. (2013). Key management for secure multicast communication: A survey. Security Days (JNS3), 2013 National. IEEE.
Pal, O., & Alam, B. (2019). Efficient and secure conditional access system for pay-TV systems. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-019-7257-5.
Kumar V., Kumar R., & Pandey S. K. (2018) An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem, in third International Conference on Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017). Communications in Computer and Information Science, vol 828. Springer, Singapore, pp. 543–554, https://doi.org/10.1007/978-981-10-8660-1_42.
Sharma, S., & Krishna, C. R. (2015). An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, pp. 687–693. https://doi.org/10.1109/cict.2015.116.
Amir, Y., Kim, Y., Rotaru, C. N., Schultz, J., Stanton, J., & Tsudik, G. (2019). Exploring Robustness in Group Key Agreement. Retrieved March 15, 2019, from http://www.cnds.jhu.edu/pub/papers/cnds-2000-4.pdf.
Adusumilli, P., & Zou, X. (2005). KTDCKM-SDC: a distributed conference key management scheme for secure dynamic conferencing. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005).
Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE.
Islam, Hafizul, S. K., & Biswas, G. P. (2017). A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University-Computer and Information Sciences, 29(1), 63–73.
Lin, I.-C., Tang, S.-S., & Wang, C.-M. (2010). Multicast key management without rekeying processes. The Computer Journal, 53(7), 939–950.
Acknowledgements
This publication is an outcome of the R&D work undertaken by a project under the Visvesvaraya Ph.D. Scheme of Ministry of Electronics & IT, Government of India, being implemented by Digital India Corporation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pal, O., Alam, B. (2020). Key Management Scheme for Secure Group Communication. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_17
Download citation
DOI: https://doi.org/10.1007/978-981-15-0694-9_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0693-2
Online ISBN: 978-981-15-0694-9
eBook Packages: EngineeringEngineering (R0)