Wireless Personal Communications

, Volume 77, Issue 1, pp 269–287 | Cite as

Autonomic Group Key Management in Deep Space DTN

  • Jian Zhou
  • Meina Song
  • Junde Song
  • Xian-wei Zhou
  • Liyan Sun


In deep space delay tolerant networks rekeying expend vast amounts of energy and delay time as a reliable end-to-end communication is very difficult to be available between members and key management center. In order to deal with the question, this paper puts forwards an autonomic group key management scheme for deep space DTN, in which a logical key tree based on one-encryption-key multi-decryption-key key protocol is presented. Each leaf node with a secret decryption key corresponds to a network member and each non-leaf node corresponds to a public encryption key generated by all leaf node’s decryption keys that belong to the non-leaf node’s sub tree. In the proposed scheme, each legitimate member has the same capability of modifying public encryption key with himself decryption key as key management center, so rekeying can be fulfilled successfully by a local leaving or joining member in lack of key management center support. In the security aspect, forward security and backward security are guaranteed. In the efficiency aspect, our proposed scheme’s rekeying message cost is half of LKH scheme when a new member joins, furthermore in member leaving event a leaving member makes tradeoff between computation cost and message cost except for rekeying message cost is constant and is not related to network scale. Therefore, our proposed scheme is more suitable for deep space DTN than LKH and the localization of rekeying is realized securely.


Deep space DTN Autonomic Group key management   Multi-decryption-key key protocol Logical key tree 



This work is supported by the National Science Foundation Project of P. R. China (No. 60903004, No. 61003250, No. 61170014), the National Science Foundation for the Doctoral Program of Higher Education of China under Grant No. 20090006110014, the Anhui Academic Science Foundation No. KJ2013B001 and the Beijing Municipal Science Foundation under Grant No. 4102042. Jian Zhou et al. are very grateful to the National Science Foundation of China (NNSFC) for the support.


  1. 1.
    Posner, E. C., & Stevens, R. (1984). Deep space communication—past, present, and future. IEEE Communications Magazine, 22, 8–21.CrossRefGoogle Scholar
  2. 2.
    Williamson, M. (1998). Deep space communications. IEE Review, 44(3), 119–122.CrossRefGoogle Scholar
  3. 3.
    Cesarone, R. J., Abraham, D. S., & Deutsch, L. J. (2007). Prospects for a next-generation deep-space network. Proceedings of the IEEE, 95(10), 1902–1915.CrossRefGoogle Scholar
  4. 4.
    Bhasin, K., Hayden, J., & Agre, J. R. (2001). Advanced communication and networking technologies for Mars exploration. In 19th annual AIAA international communications satellite systems conference, Toulouse, France.Google Scholar
  5. 5.
    Weber, W. J., Cesarone, R. J., & Abraham, D. S. (2006). Transforming the deep space network into the interplanetary network. Acta Astronautica, 58(8), 411–421.CrossRefGoogle Scholar
  6. 6.
    Bhasin, K., & Hayden, J. L. (2002). Space Internet architecture and technologies for NASA enterprises. International Journal of Satellite Communications, 20(5), 311–332.CrossRefGoogle Scholar
  7. 7.
    Naitong, Z., Hui, L., & Qinyu, Z. (2007). Thought and developing trend in deep space exploration and communication. Journal of Astronautics, 28(4), 786–793.Google Scholar
  8. 8.
    Jianshe, Y. E., Shijie, S., & Rongjun, S. (2010). Research on DTNfor deep space communications. Journal of Astronautics, 11(4), 941–950.Google Scholar
  9. 9.
    Yu, C., Xin, M., & Lei, Z. (2012). Analysis of protocol of space information network. Computer Technology and development, 22(6), 1–5.Google Scholar
  10. 10.
    Burleigh, S., Hooke, A., & Torgerson, L. (2003). Delay tolerant networking: An approach to interplanetary internet. IEEE Communications Magazine, 41(6), 128–136.CrossRefGoogle Scholar
  11. 11.
    Mohanchur, S., Kaushal, K. S., & Kankar, S. D. (2011). Delay resistant transport protocol for deep space communication. International Journal of Communicaitons, Network and System Sciences, 4, 122–132.CrossRefGoogle Scholar
  12. 12.
    Roy, C. A., Baras, J. S., Hadjitheodosiou, M., & Rentz, N. (2005). Hybrid networks with a space segment-topology design and security issues. In Military communications conference, 2005 (vol. 3, pp. 1414–1420). MILCOM 2005. IEEE.Google Scholar
  13. 13.
    Johann, V. D. M., Dawoud, D., & Tephen, M. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys, 39(1), 1–46.CrossRefGoogle Scholar
  14. 14.
    Yacine, C., & Hamida, S. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(2), 105–119.Google Scholar
  15. 15.
    Rani, T. P., & Jaya, K. C. (2012). Survey on key pre distribution for security in wireless sensor networks. Lecture Notes of the Institute for Computer Sciences, 84, 248–252.Google Scholar
  16. 16.
    Dandan, L., Runtong, Z., & Chuanchen, W. (2012). Efficient group key management scheme with hierarchy structure. Chinese Journal of Electronics, 1(2), 249–253.Google Scholar
  17. 17.
    Seba, H., Lagraa, S., & Kheddouci, H. (2012). Alliance-based clustering scheme for group key management in mobile ad hoc networks. Journal of Supercomputing, 61(3), 481–501.CrossRefGoogle Scholar
  18. 18.
    Juhyung, S., Junsik, L., & Seungwoo, S. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Personal Communications, 52(2), 359–382.CrossRefGoogle Scholar
  19. 19.
    Elisavet, K. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384–393.CrossRefGoogle Scholar
  20. 20.
    Klaoudatou, E., & Konstantinou, E. (2011). A survey on cluster-based group key agreement protocols for WSNs. Communications Surveys and Tutorials, IEEE, 13(3), 429–442.CrossRefGoogle Scholar
  21. 21.
    Zhiwen, W., & Shaozi, Li. (2012). A secure and high-efficient dynamic key management scheme for group communication using optimized GDH. ICIC Express Letters, 6(7), 1815–1820.Google Scholar
  22. 22.
    Pen, X., Jingsha, H., & Yingfang, F. (2012). Distributed group key management in wireless mesh networks. International Journal of Security and its Applications, 6(2), 115–120.Google Scholar
  23. 23.
    Suganthi, N., Sumathi, V., & Mohanapriyha, R. S. (2011). Secure group key management for dynamic sensor networks. Journal of Computer Sciences, 7(7), 997–1002.Google Scholar
  24. 24.
    Yingli, S., Cruickshank, H., Moseley, M., & Ashworth, J. (2011). Security architecture for satellite services over cryptographically heterogeneous networks. In Proceedings of the 2011 6th international ICST conference on communications and networking in China (pp. 1093–1098).Google Scholar
  25. 25.
    Drakakis, K. E., Panagopoulos, A. D., & Cottis, P. G. (2003). Overview of satellite communication networks security: Introduction of EAP. International Journal of Security and Networks, 4(3), 164–170.CrossRefGoogle Scholar
  26. 26.
    EunJ, Y., KeeY, Y., & Jeong, W. H. (2011). An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP Journal on Wireless Communications and Networking, 86, 1–10.Google Scholar
  27. 27.
    Howarth, M. P., Iyengar, S., Sun, Z., & Cruickshank, H. (2004). Dynamics of key management in secure satellite multicast. IEEE Journal on Selected Areas in Communications, 2(2), 308–319.CrossRefGoogle Scholar
  28. 28.
    Arslan, M. G., & Alagöz, F. (2006). Security issues and performance study of key management techniques over satellite links. In 11th international workshop on computer-aided modeling, analysis and design of communication links and networks (pp. 122–128).Google Scholar
  29. 29.
    Ahmad, K., Bakhache, B., El, A.S., & Sindian, S. (2012). A scalable key management scheme for secure IP multicast over DVB-S using chaos. In Proceedings of the Mediterranean electrotechnical conference—MELECON (pp. 736–740).Google Scholar
  30. 30.
    Chung, K. W., Mohamed, G., & Simon, S. (2000). Secure group communications using key graphs. IEEE/Acm Transactions on Networking, 8(1), 31–37.CrossRefGoogle Scholar
  31. 31.
    Zhen, W., Xuehui, D., & Yi, S. (2011). Group key management scheme based on proxy re-cryptography for near-space network. International Conference on Network Computing and Information Security, 2011, 52–57.Google Scholar
  32. 32.
    Zhong, Y., & Jian-feng, M. (2011). Identity based group key management scheme for LEO/MEO double-layer space information network. Journal of Astronautics, 32(7), 1551–1557.Google Scholar
  33. 33.
    Steiner, M., & Waidner, M. (1996). Diffie–Hellman key distribution extended to groups. In Proceedings of the 3rd ACM symposium on computer and communications security (vol. 1, pp. 31–37).Google Scholar
  34. 34.
    Peoples, C., Parr, G., Scotney, B., Moore, A. (2011). Autonomic context-aware management in interplanetary communications systems. IEEE Aerospace and Electronic Systems Magazine, 26(2), 26–33.CrossRefGoogle Scholar
  35. 35.
    Bokor, E. (2001). Automating operations for NASA’s deep space network (DSN). In Aerospace conference, 2001. IEEE proceedings (vol. 7, pp. 3383–3390).Google Scholar
  36. 36.
    Wódczak, M., & Wódczak, M. (2010). Future autonomic cooperative networks. In 2nd international ICST conference on mobile networks and management. MONAMI (pp. 71–78).Google Scholar
  37. 37.
    Coronado, G.L.C., & PérezL, C. (2011). An autonomous decentralized public key infrastructure. In Proceedings—2011 10th international symposium on autonomous decentralized systems (pp. 409–414).Google Scholar
  38. 38.
    Harney, H., & Muckenhirn, C. (1997). Group key management protocol (GKMP) architecture, RFC 2094.Google Scholar
  39. 39.
    Feng, B., Robert, H. D., & Huafei, Z. (2003). Variations of Diffie–Hellman problem. Lecture Notes in Computer Science, 2836(2003), 301–312.Google Scholar
  40. 40.
    Jonathan, K., & Yehuda, L. (2007). Introduction to modern cryptography. London: Chapman & Hall/CRC Press.Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Jian Zhou
    • 1
    • 2
    • 3
  • Meina Song
    • 1
  • Junde Song
    • 1
  • Xian-wei Zhou
    • 3
  • Liyan Sun
    • 2
  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.School of Management Science and EngineerAnhui University of Finance and EconomicsBengbuChina
  3. 3.School of Computer and Communication EngineeringUniversity of Science and Technology BeijingBeijingChina

Personalised recommendations