Skip to main content
Log in

Secured Key Management Scheme for Multicast Network Using Graphical Password

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In recent days, management of keys in a group has become a significant part of data communication. The textual and alphanumerical passwords used for security concern have now changed its trend to different graphical passwords procedures. Many researchers have introduced various efficient and scalable key management schemes and it is difficult to remember this type of password. There are many textual password authentication mechanisms now available in the software market and are prone to eavesdropping, dictionary attacks and shoulder surfing. To address all the above vulnerability, many researchers and practitioners have developed different authentication methods who are interested in finding an alternate way to the existing problem. Hence, this paper proposes a secure group communication scheme between group members using graphical passwords and this is easy to remember compared to a textual password but difficult to hack. The elliptic curve cryptography technique is applied for key distribution. The group key is a graphical password which is static and shared among all the members in a group. The sequence of images will be sent to the members/users of a group during registration to form a group key and the group controller sends a pass point value of each image to the member by using elliptic curve cryptography after the registration. The main focus of the proposed scheme is to provide better security and ensures negligible communication overhead and computation overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Srinivasan R, Vaidehi V, Rajaraman R, Kanagaraj S (2010) Secure group key management scheme for multicast networks. Int J Netw Sec 11(1):33–38

    Google Scholar 

  2. Real User Corporation: Passfaces. www.passfaces.com

  3. Dhamija R, Perrig A (2000)Deja vu: a user study using images for authentication. Proc 9th USENIX Sec Sym

  4. Mingyan L, Poovendran R, Berenstein C (2002) Design of Secure Multicast key Management Schemes with Communication Budget Constraint. IEEE Commun Lett 6(3):108–110. https://doi.org/10.1109/4234.991148

    Article  Google Scholar 

  5. Pitipatana S, Nirwan A (2007) Elliptic curve cryptosystem-based group key Management for Secure Group Communications, Proc IEEE Military Commun Conf Orlando, USA: 1–6

  6. Sharma S, Rama Krishna C (2015) An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. Proc IEEE Int Conf Comput Intell Commun Technol Ghaziabad U.P, India 116:687–693. https://doi.org/10.1109/CICT.2015

    Google Scholar 

  7. E. Munivel, J. Lokesh (2008) Design of Secure Group key Management Scheme for multicast networks using number theory. Proc Int Conf Comput Intell Modell Control Autom Vienna, Austria. doi:https://doi.org/10.1109/CIMCA.2008. 29, pp.124–129

  8. Jabeen Begum S, Purusothaman T (2011) A new scalable and reliable cost effective key agreement protocol for secure group communication. J Comput Sci 7(3):328–340

    Article  Google Scholar 

  9. Li S, Wu Y (2010) A survey on key management for multicast. Proc Second Int Conf Inform Technol Comput Sci Vienna, Austria 82:309–312. https://doi.org/10.1109/ITCS.2010

    Google Scholar 

  10. Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329. https://doi.org/10.1145/937503.937506

    Article  Google Scholar 

  11. Srinivasan T, Sathish S, Vijay Kumar R, Vijayender MVB (2006) A hybrid scalable group key management approach for large dynamic multicast networks. Proc Sixth IEEE International Conf. on Computer and Information Technology, Dhaka, Bangladesh. https://doi.org/10.1109/CIT.2006.9

  12. Ilango S, Thomas J (2004) Group key management utilizing Huffman and Petrick based approaches. Proc Int Conf Inform Technol: Coding Comput Las Vegas, USA. https://doi.org/10.1109/ITCC.2004.1286664

  13. Nasreldin Rasslan MM, Dakroury HY, Aslan HK (2009) A new secure multicast key distribution protocol using combinatorial Boolean approach. Int J Netw Sec 8(1):75–89

    Google Scholar 

  14. Jancy Rani D, Sabarinathan P (2016) Security based service key Management for Multiple Group. Int J Innov Res Comput Commun Eng 4(1):556–560. https://doi.org/10.15680/IJIRCCE.2016.0401126

  15. A. Herzberg, S. Jarecki, H. Krawczyk, Yung M (1995) proactive secret sharing or how to COpe with perpetual leakage, Proc 15th Annual International Cryptology Conference Adv Cryptol, Springer-Verlag, California, USA: 339–352

  16. Walanjkar DD, Nandedkar V (2014) User authentication using graphical password scheme: a more secure approach using Mobile Interface. Int J Innov Res Comput Commun Eng 2(12):7329–7335. https://doi.org/10.15680/ijircce.2014.0212053

    Google Scholar 

  17. Keerthana R, SaravanaKumar NM (2014) A cost effective multicast key management scheme for secure group communication. Int J Innov Res Comput Commun Eng 2(1):1177–1183

    Google Scholar 

  18. Mythili GM, SaravanaKumar NM (2014) Dynamic architecture for scalable and proficient group key management. Int J Innov Res Comput Commun Eng 2(1):1177–1183

    Google Scholar 

  19. Khandelwal A, Singh S, Satnalika N (2010) User authentication by secured graphical password implementation. Int J Comput Applic 1(25):100–104. https://doi.org/10.5120/449-751

    Google Scholar 

  20. Moraskar V, Jaikalyani S, Saiyyed M, Gurnani J, Pendke K (2014) Cued click point technique for graphical password authentication. Int J Comput Sci Mobile Comput 3(1):166–172

    Google Scholar 

  21. Widenbeck S, Waters J, Birget J, Brodskiy A, Memon N (2005) Authentication using Graphical Passwords: Basic Results. Proc Sym Usable Privacy Security, New York, USA:1–12. doi:https://doi.org/10.1145/1073001.1073002

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Lavanya.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavanya, S., SaravanaKumar, N.M., Vijayakumar, V. et al. Secured Key Management Scheme for Multicast Network Using Graphical Password. Mobile Netw Appl 24, 1152–1159 (2019). https://doi.org/10.1007/s11036-019-01252-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01252-4

Keywords

Navigation