Abstract
In the next generation mobile environment, which uses 4G cellular and high-speed wireless LANs, novel group communication services among mobile users are expected to grow up. Security technologies for these group type services are challenging research area, especially, decentralization of group key management is important for large users. In this paper, we propose a fully decentralized key management scheme FDLKH that provides a key updating mechanism for dynamic group without any central server. This scheme inherits the key updating mechanism of the Logical Key Hierarchy scheme LKH, which is based on a central server system, and extends the LKH not to expect any central server but to use representative members of a group called captains. On the FDLKH, the total variety of keys in a group is half of that of the LKH. The costs for a member join or leave keep the logarithmic order of the number of members.
Chapter PDF
References
Yoshida, M., Kuroda, M., Kiyomoto, S., Tanaka, T.: A secure service architecture for beyond 3G wireless network. In: Proc. 6th International Symposium on Wireless Personal Multimedia Communications, vol. 2, pp. 579–583 (2003)
Kuroda, M., Inoue, M., Okubo, A., Sakakura, T., Shimizu, K., Adachi, F.: Scalable mobile ethernet and fast vertical handover. In: Proc. IEEE Wireless Communications and Networking Conference 2004, vol. A27-3 (2004)
Harney, H., Muckenhirn, C., Rivers, T.: Group key management protocol (GKMP) specification. IETF, RFC 2093 (1997)
Harney, H., Muckenhirn, C., Rivers, T.: Group key management protocol (GKMP) architecture. IETF, RFC 2094 (1997)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. IETF, RFC 2627 (1999)
Wong, C.K., Gouda, M., Lam, S.: Secure group communication using key graphs. IEEE/ACM Trans. on Networking 8(1), 16–30 (2000)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and efficient constructions. In: Proc. IEEE Infocom 1999, vol. 2, pp. 708–716 (1999)
McGrew, D.A., Sherman, A.T.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. on Software Engineering 29(5), 444–458 (2003)
Perrig, A., Song, D., Tygar, J.D.: ELK: a new protocol for efficient large-group key distribution. In: Proc. 2001 IEEE Security and Privacy Symposium, pp. 247–262 (2001)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Proc. Mobile Computing and Networking 2001, pp. 189–199 (2001)
Law, Y.W., Corin, R., Etalle, S., Hartel, P.H.: A formally verified decentralized key management architecture for wireless sensor networks. In: Proc. Personal Wireless Communications 2003, pp. 27–39 (2003)
Steer, D.G., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems 11(8), 769–780 (2000)
Alves-Foss, J.: An efficient secure authenticated group key exchange algorithm for large and dynamic groups. In: Proc. 23rd National Information Systems Security Conference, pp. 254–266 (2000)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: ACM Conference on Computer and Communications Security 2000, pp. 235–244 (2000)
Lynch, N.: Distributed algorithms. Morgan Kaufmann Publishers, San Francisco (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Inoue, D., Kuroda, M. (2004). FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. In: Jakobsson, M., Yung, M., Zhou, J. (eds) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol 3089. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24852-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-24852-1_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22217-0
Online ISBN: 978-3-540-24852-1
eBook Packages: Springer Book Archive