Study of Proxy Re-cryptography in Group Key Management for Group Communications System

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 225)

Abstract

This paper presents a group key management mechanism PTGKM based on hierarchical and domain structure in Near-Space Network. The mechanism combines hierarchical and domain structure with the use of proxy re-cryptography algorithms. It has the following characteristics: (1) the core backbone network node cannot obtain the new group key. It only participates in the distribution of the new group key. So the mechanism solves the problem of a single point of failure of group key management based on hierarchical and domain structure; (2) The mechanism restricts the impact of group membership change in its domain, which improves the scalability of group key management scheme; (3) The inter-domain switching algorithm effectively reduces the rekeying overhead of the high mobile nodes’ frequent switching between different domains; (4) The mechanism adapts to the characteristics of Near-Space Network and meets the forward security and backward security. The analysis results show that, PTGKM mechanism is applicable to near space environment and has good scalability and reliability.

Keywords

Group key management Proxy re cryptography Security 

References

  1. 1.
    Wu Ys (2003) High altitude platform stations information system new generation-wireless communications system (part I). China Radio Manage 13(4):38–45Google Scholar
  2. 2.
    Wu YS (2003) High altitude platform stations information system new generation-wireless communications system (part II). China Radio Manage 22(6):87–92Google Scholar
  3. 3.
    Karapantazis S, Pavlidou F (2005) Broadband communications via high-altitude platforms: a survey. IEEE Commun Surv Tutor 33(12):131–138Google Scholar
  4. 4.
    Li JH, Levy R, Yu M (2006) A scalable key management and clustering scheme for ad hoc networks. INFOSCALE 44(8):190–195Google Scholar
  5. 5.
    Jun BH, Young JS, Hyun SY (2007) Decentralized group key management for dynamic networks using proxy cryptography. 17(19):576–583Google Scholar
  6. 6.
    Zhang Xh (2007) The research on the key management of ad hoc network clustering topology, Master thesis of Beijing University of posts and telecommunications 15(17):546–551Google Scholar
  7. 7.
    Zhang XN, Feng DG (2006) A cluster based security scheme in wireless ad hoc networks. J Comput Res Dev 61(23):238–243Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Institute for Interdisciplinary Information ScienceTsinghai UniversityBeijingChina

Personalised recommendations