Abstract
In recent days, management of keys in a group has become a significant part of data communication. The textual and alphanumerical passwords used for security concern have now changed its trend to different graphical passwords procedures. Many researchers have introduced various efficient and scalable key management schemes and it is difficult to remember this type of password. There are many textual password authentication mechanisms now available in the software market and are prone to eavesdropping, dictionary attacks and shoulder surfing. To address all the above vulnerability, many researchers and practitioners have developed different authentication methods who are interested in finding an alternate way to the existing problem. Hence, this paper proposes a secure group communication scheme between group members using graphical passwords and this is easy to remember compared to a textual password but difficult to hack. The elliptic curve cryptography technique is applied for key distribution. The group key is a graphical password which is static and shared among all the members in a group. The sequence of images will be sent to the members/users of a group during registration to form a group key and the group controller sends a pass point value of each image to the member by using elliptic curve cryptography after the registration. The main focus of the proposed scheme is to provide better security and ensures negligible communication overhead and computation overhead.
Similar content being viewed by others
References
Srinivasan R, Vaidehi V, Rajaraman R, Kanagaraj S (2010) Secure group key management scheme for multicast networks. Int J Netw Sec 11(1):33–38
Real User Corporation: Passfaces. www.passfaces.com
Dhamija R, Perrig A (2000)Deja vu: a user study using images for authentication. Proc 9th USENIX Sec Sym
Mingyan L, Poovendran R, Berenstein C (2002) Design of Secure Multicast key Management Schemes with Communication Budget Constraint. IEEE Commun Lett 6(3):108–110. https://doi.org/10.1109/4234.991148
Pitipatana S, Nirwan A (2007) Elliptic curve cryptosystem-based group key Management for Secure Group Communications, Proc IEEE Military Commun Conf Orlando, USA: 1–6
Sharma S, Rama Krishna C (2015) An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. Proc IEEE Int Conf Comput Intell Commun Technol Ghaziabad U.P, India 116:687–693. https://doi.org/10.1109/CICT.2015
E. Munivel, J. Lokesh (2008) Design of Secure Group key Management Scheme for multicast networks using number theory. Proc Int Conf Comput Intell Modell Control Autom Vienna, Austria. doi:https://doi.org/10.1109/CIMCA.2008. 29, pp.124–129
Jabeen Begum S, Purusothaman T (2011) A new scalable and reliable cost effective key agreement protocol for secure group communication. J Comput Sci 7(3):328–340
Li S, Wu Y (2010) A survey on key management for multicast. Proc Second Int Conf Inform Technol Comput Sci Vienna, Austria 82:309–312. https://doi.org/10.1109/ITCS.2010
Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329. https://doi.org/10.1145/937503.937506
Srinivasan T, Sathish S, Vijay Kumar R, Vijayender MVB (2006) A hybrid scalable group key management approach for large dynamic multicast networks. Proc Sixth IEEE International Conf. on Computer and Information Technology, Dhaka, Bangladesh. https://doi.org/10.1109/CIT.2006.9
Ilango S, Thomas J (2004) Group key management utilizing Huffman and Petrick based approaches. Proc Int Conf Inform Technol: Coding Comput Las Vegas, USA. https://doi.org/10.1109/ITCC.2004.1286664
Nasreldin Rasslan MM, Dakroury HY, Aslan HK (2009) A new secure multicast key distribution protocol using combinatorial Boolean approach. Int J Netw Sec 8(1):75–89
Jancy Rani D, Sabarinathan P (2016) Security based service key Management for Multiple Group. Int J Innov Res Comput Commun Eng 4(1):556–560. https://doi.org/10.15680/IJIRCCE.2016.0401126
A. Herzberg, S. Jarecki, H. Krawczyk, Yung M (1995) proactive secret sharing or how to COpe with perpetual leakage, Proc 15th Annual International Cryptology Conference Adv Cryptol, Springer-Verlag, California, USA: 339–352
Walanjkar DD, Nandedkar V (2014) User authentication using graphical password scheme: a more secure approach using Mobile Interface. Int J Innov Res Comput Commun Eng 2(12):7329–7335. https://doi.org/10.15680/ijircce.2014.0212053
Keerthana R, SaravanaKumar NM (2014) A cost effective multicast key management scheme for secure group communication. Int J Innov Res Comput Commun Eng 2(1):1177–1183
Mythili GM, SaravanaKumar NM (2014) Dynamic architecture for scalable and proficient group key management. Int J Innov Res Comput Commun Eng 2(1):1177–1183
Khandelwal A, Singh S, Satnalika N (2010) User authentication by secured graphical password implementation. Int J Comput Applic 1(25):100–104. https://doi.org/10.5120/449-751
Moraskar V, Jaikalyani S, Saiyyed M, Gurnani J, Pendke K (2014) Cued click point technique for graphical password authentication. Int J Comput Sci Mobile Comput 3(1):166–172
Widenbeck S, Waters J, Birget J, Brodskiy A, Memon N (2005) Authentication using Graphical Passwords: Basic Results. Proc Sym Usable Privacy Security, New York, USA:1–12. doi:https://doi.org/10.1145/1073001.1073002
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lavanya, S., SaravanaKumar, N.M., Vijayakumar, V. et al. Secured Key Management Scheme for Multicast Network Using Graphical Password. Mobile Netw Appl 24, 1152–1159 (2019). https://doi.org/10.1007/s11036-019-01252-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01252-4