Advertisement

Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast

  • J. A. M. Naranjo
  • L. G. Casado
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)

Abstract

The secure multicast field has been extensively studied for more than a decade now and there exist numerous proposals throughout academic literature. This paper presents a selection of those most important and popular to the date, focusing on centralized schemes due to their high popularity and the recent publication of alternatives that do not appear in previous revisions. Comparisons are provided and special attention is paid to communications and storage overhead.

Keywords

key distribution secure group communication centralized secure multicast 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)CrossRefGoogle Scholar
  3. 3.
    Chan, K.-C., Chan, S.-H.G.: Key management approaches to offer data confidentiality for secure multicast. IEEE Network 17(5), 30–39 (2003)CrossRefGoogle Scholar
  4. 4.
    Zhu, S., Jajodia, S.: Scalable group key management for secure multicast: A taxonomy and new directions. In: Huang, H., MacCallum, D., Du, D.-Z. (eds.) Network Security, pp. 57–75. Springer, US (2010)CrossRefGoogle Scholar
  5. 5.
    Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification. RFC 2093 (1997)Google Scholar
  6. 6.
    Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. RFC 2627 (1999)Google Scholar
  7. 7.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)CrossRefGoogle Scholar
  8. 8.
    Chan, K.-C., Chan, S.-H.G.: Distributed servers approach for large-scale secure multicast. IEEE JSAC 20(8) (October 2002)Google Scholar
  9. 9.
    Chan, K.-C., Chan, S.-H.G.: Distributed servers networks for secure multicast. In: Proc. IEEE Globecom 2001, San Antonio, TX, pp. 25–29 (2001)Google Scholar
  10. 10.
    Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)CrossRefGoogle Scholar
  11. 11.
    Di Pietro, R., Mancini, L.V., Jajodia, S.: Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp. 66–73 (2002)Google Scholar
  12. 12.
    Lin, J.-C., Huang, K.-H., Lai, F., Lee, H.-C.: Secure and efficient group key management with shared key derivation. Comput. Stand. Inter. 31(1), 192–208 (2009)CrossRefGoogle Scholar
  13. 13.
    Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Software 29, 444–458 (2003)CrossRefGoogle Scholar
  14. 14.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of INFOCOM 1999, pp. 708–716. IEEE, Los Alamitos (1999)Google Scholar
  15. 15.
    Perrig, A., Song, D., Tygar, J.D.: Elk, a new protocol for efficient large-group key distribution. Proceedings of IEEE S&P, 247–262 (2001)Google Scholar
  16. 16.
    Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications E85-B(5), 1050–1051 (2002)Google Scholar
  17. 17.
    Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings 2003 International Conference on Parallel Processing Workshops, pp. 391–396 (October 2003)Google Scholar
  18. 18.
    Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of INFOCOM 1999, pp. 689–698. IEEE, Los Alamitos (1999)Google Scholar
  19. 19.
    Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2824–2834 (2001)Google Scholar
  20. 20.
    Zhou, Z., Huang, D.: An optimal key distribution scheme for secure multicast group communication. In: INFOCOM 2010, pp. 331–335 (2010)Google Scholar
  21. 21.
    Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption, pp. 459–474. Springer, Heidelberg (1999)zbMATHGoogle Scholar
  22. 22.
    Chiou, G.-h., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Trans. Softw. Eng. 15(8), 929–934 (1989)CrossRefGoogle Scholar
  23. 23.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to privacy and secure communications. In: Proceedings of CMMSE (2010)Google Scholar
  24. 24.
    Scheikl, O., Lane, J., Boyer, R., Eltoweissy, M.: Multi-level secure multicast: the rethinking of secure locks. In: Proceedings International Conference on Parallel Processing Workshops, pp. 17–24 (2002)Google Scholar
  25. 25.
    Pais, A.R., Joshi, S.: A new probabilistic rekeying method for secure multicast groups. Int. J. Inf. Secur. 9, 275–286 (2010)CrossRefGoogle Scholar
  26. 26.
    Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group communications. In: INFOCOM 2004, vol. 2, pp. 1296–1306 (2004)Google Scholar
  27. 27.
    Sun, Y., Liu, K.J.R.: Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Netw. 15, 1514–1526 (2007)CrossRefGoogle Scholar
  28. 28.
    Zhang, Q., Wang, Y., Jue, J.P.: A key management scheme for hierarchical access control in group communication. International Journal of Network Security 7(3), 323–334 (2008)Google Scholar
  29. 29.
    Zhang, J., Varadharajan, V., Mu, Y.: A scalable multi-service group key management scheme. In: Proceedings of AICT-ICIW 2006, pp. 172–177 (2006)Google Scholar
  30. 30.
    Yan, J., Ma, J., Liu, H.: Key hierarchies for hierarchical access control in secure group communications. Computer Networks 53(3), 353–364 (2009)CrossRefzbMATHGoogle Scholar
  31. 31.
    Hur, J., Yoon, H.: A multi-service group key management scheme for stateless receivers in wireless mesh networks. Mob. Netw. Appl. 15, 680–692 (2010)CrossRefGoogle Scholar
  32. 32.
    Zhu, S., Setia, S., Jajodia, S.: Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds.) NGC 2003 and ICQT 2003. LNCS, vol. 2816, pp. 107–118. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  33. 33.
    Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)Google Scholar
  34. 34.
    Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM conference on Computer and Communications Security, CCS 2003, pp. 231–240 (2003)Google Scholar
  35. 35.
    Dutta, R., Dong, Y., Mukhopadhyay, W.S.: Constant storage self-healing key distribution with revocation in wireless sensor network (2007)Google Scholar
  36. 36.
    Du, W., He, M.: Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345–359. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  37. 37.
    Du, W., He, M., Li, X.: A new constant storage self-healing key distribution with revocation in wireless sensor networks. In: Hua, A., Chang, S.-L. (eds.) ICA3PP 2009. LNCS, vol. 5574, pp. 832–843. Springer, Heidelberg (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • J. A. M. Naranjo
    • 1
  • L. G. Casado
    • 1
  1. 1.Dpt. of Computer Architecture and ElectronicsUniversity of AlmeríaSpain

Personalised recommendations