Skip to main content

Key Management Scheme for Secure Group Communication

  • Conference paper
  • First Online:
Advances in Data and Information Sciences

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 94))

Abstract

Multicast or group communication enables the distribution of the content in a one-to-many fashion. In multicast communication, the major challenges are dynamicity of group, forward and backward secrecy of the data. There are issues like single-point failure in centralized Group Key Management (GKM), false participation attack in participatory GKM, member dynamicity in Logical Key Hierarchy, etc. To address the various issues of centralized, participatory and LKH GKM; in this paper, we proposed a Key Management Scheme for Secure Group Communication. In the proposed scheme, network members share the computational load of the server and scheme achieves the forward and backward secrecy. The proposed scheme is well suitable for one-to-many mode communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. VijayaKumar, P. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.

    Google Scholar 

  2. VijayaKumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralized group key management for secure multicast communication. IET information Security, 8(3).

    Google Scholar 

  3. Wallner, D. M., Harder, E. J., & Agee, R. C. (1998). Key management for multicast: issues and architectures. Internet Draft Report, Filename: draft-wallner-key-arch-01.txt.

    Google Scholar 

  4. Wallner, D., Harder, E., & Agee, R. (1999). Key Management for Multicast: Issues and Architectures. RFC 2627.

    Google Scholar 

  5. Kumar, V., Kumar, R., & Pandey, S. K. (2018). A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. Journal of King Saud University Information Sciences. https://doi.org/10.1016/j.jksuci.2017.12.014.

  6. Steiner, M., Tsudik, G., & Waidne, M., Diffie-hellman key distribution extended to group communication. IBM Ziirich Research Laboratory CH-8803 Riischlikon, Switzerland.

    Google Scholar 

  7. Liu, Z., Lai, Y., Ren, X., & Bu, S. (2012). An efficient LKH tree balancing algorithm for group key management. In 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 1003–1005.

    Google Scholar 

  8. Kumar, V., Kumar, R. & Pandey, S. K. (2018). Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. International Journal of Information Technology, pp. 1–6. https://doi.org/10.1007/s41870-018-0140-1.

  9. Sherman, A. T., & Mcgrew, D. A. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions On Software Engineering, 29(5).

    Google Scholar 

  10. Odelu, V., Das, A. K., & Goswami, A. (2016). A secure effective dynamic group passwordbased authenticated key agreement scheme for the integrated EPR information system. Journal of King Saud University-Computer and Information Sciences, 28(1), 68–81.

    Google Scholar 

  11. Xu, L., & Huang, C. (2008). Computation-efficient multicast key distribution. IEEE Transactions on Parallel and Distributed Systems, 19(5), 577–587.

    Article  Google Scholar 

  12. Rafaeli, S., & Hutchison, D. (2002). Hydra: a decentralized group key management. In 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.

    Google Scholar 

  13. Hanatani, Y., et al. (2016). Secure multicast group management and key distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing, pp. 227–243.

    Google Scholar 

  14. Ballardie, A. (1997). Core Based Trees (CBT version 2) Multicast Routing protocol specification”, September 1997. RFC 2189.

    Google Scholar 

  15. Baddi, Y., & Dafir Ech-Cherif El Kettani, M. (2013). Key management for secure multicast communication: A survey. Security Days (JNS3), 2013 National. IEEE.

    Google Scholar 

  16. Pal, O., & Alam, B. (2019). Efficient and secure conditional access system for pay-TV systems. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-019-7257-5.

    Article  Google Scholar 

  17. Kumar V., Kumar R., & Pandey S. K. (2018) An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem, in third International Conference on Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017). Communications in Computer and Information Science, vol 828. Springer, Singapore, pp. 543–554, https://doi.org/10.1007/978-981-10-8660-1_42.

  18. Sharma, S., & Krishna, C. R. (2015). An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In 2015 IEEE International Conference on Computational Intelligence & Communication Technology, Ghaziabad, pp. 687–693. https://doi.org/10.1109/cict.2015.116.

  19. Amir, Y., Kim, Y., Rotaru, C. N., Schultz, J., Stanton, J., & Tsudik, G. (2019). Exploring Robustness in Group Key Agreement. Retrieved March 15, 2019, from http://www.cnds.jhu.edu/pub/papers/cnds-2000-4.pdf.

  20. Adusumilli, P., & Zou, X. (2005). KTDCKM-SDC: a distributed conference key management scheme for secure dynamic conferencing. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005).

    Google Scholar 

  21. Naranjo, J. A. M., Lopez-Ramos, J. A., & Casado, L. G. (2010). Applications of the extended Euclidean algorithm to privacy and secure communications. In Proceedings of the 10th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE.

    Google Scholar 

  22. Islam, Hafizul, S. K., & Biswas, G. P. (2017). A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University-Computer and Information Sciences, 29(1), 63–73.

    Google Scholar 

  23. Lin, I.-C., Tang, S.-S., & Wang, C.-M. (2010). Multicast key management without rekeying processes. The Computer Journal, 53(7), 939–950.

    Article  Google Scholar 

Download references

Acknowledgements

This publication is an outcome of the R&D work undertaken by a project under the Visvesvaraya Ph.D. Scheme of Ministry of Electronics & IT, Government of India, being implemented by Digital India Corporation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Om Pal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pal, O., Alam, B. (2020). Key Management Scheme for Secure Group Communication. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0694-9_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0693-2

  • Online ISBN: 978-981-15-0694-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics