Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey of Secure Group Key Management

D. Anitha, Dr. M. Punithavalli

Abstract


Group key management is an important functional building block for any secure multicast architecture. Many grouporiented and distributed applications need security services which includes key management. Such applications need a secure group key to communicate their data. This brings importance to key distribution techniques. Secure group communication has applications in multimedia conferencing, stock quote distribution shared work space,distributed interactive simulation, grid computing, teleconferences, pay-per-view, multi party games etc., some of these applications engage in one to many communications while others involve many to many communications. Several protocols have been proposed to support secure group key management. This paper focuses on several protocols that are designed for secure group key management. Various protocols are discussed on focusing the key management.


Keywords


Group Key Management, Security, Secure Group Communication, Multicast.

Full Text:

PDF

References


CH.Aswani Kumar, R. Sri lakshmi and M.Preethi Implementing Secure Group Communication Using Key Graphs. Defence Science Journal,Vol.56, No.2, December 2007.

Yair Amir, Member IEEE, Cristine Nita-Rotaru, Member IEEE,Jonathan Stanton, Member IEEE and Gene Tsudik, Member IEEE Secure Spread:An Integrated Architecture For Secure Group communication

C.Diot, W.Dabbous and J.Crow croft. Group communication IEEE Journal On selected area in communication, 15(3), 277-290, April 1997. Special issue on Group Communication.

H.Erikson The Multicast Backbone..MBONE. Communications of the ACM, 37(8):54-60, August 1994.

K.Obraczka. Multicast Transport Protocols. A Survey and Taxonomy.IEEE Communications Magazine, 36(1).94-103, January 1998. Selected papers from ISS 1997.

T.Ballardie and J.Crow Croft. Multicast Specific Security Threats and Counter-Measures. In proc. Symposium on Network and Distributed System Security, pages 2-16, San Deiege California, February 1995.

B.Parvatha Varthini S.Valli . Performance Analysis of Rekeying Protocols in Multicast Group Key Management and Information Technology Journal 5(3):405-408, 2006 ISSN 1812-5638/2006 Asian Network for Scientific Information.

B.Quinn, Celox Networks, K.Almeroth GC Santa Barbara, RFC3170 IP Multicast Application: Challenges and Solutions. September 2001.

Paul Judge and Mostafa Ammar Security Issues and Solutions in Multicast Content Distribution., Georgia. Institute of Technology.

Avognon, Zhi Tang Li, New Multicast Technology “Survey and Security Concerns”, Huazhang University of Science and Techonology, Information Technology Journal 3(1) 95-105, 2004 ISSN 1682-6027,2004 Asian Network for Scientific Information.

The Challenge of Implementing IP Multicast.

Jamming Zhu, Li Yam A New Protocol for Secure Group Key Management in Wireless Network. MOMM 2006 and IIWAS 2006 Workshop Proceedings.

Yair Amir, Yongdae Kim, Gene Tsudik, Cristina Nita- Rataru. On the Performance of Group Key Agreement Protocols

T.Ballardie, J.Francis and P.Crowcraft .Core Based Trees: An Architecture for Scalable Interdomain Multicast Routing. In Proceedings of ACM SIGCOMM’93(1993), pp.85-95.

T.Hard Jono, B.Cain and Monga Intradomian Group Key Management Protocols. Work in progress, September 2000.

H.Harney and C.Muckenhirn, Group Key Management Protocol(GKMP) Specification RFC 2093 July 1997.

M.Burmester and Y.Desmedt, A Secure and Efficient Conference Key Distribution System. Advances in Cryptolog-Eurocrypt’94, May 1994.

M.Steiner, G.Tsudik and M.Waidner.Key Agreement in Dynamic Peer Groups.

B.quinn, K.Almerotlu, UC-Sant Barbara, RFC3170 IP Multicast Applications: Challenges and Solutions Celox Networks, September 2001.

Yacine Challal, Hamida Seba, Group Key Management Protocols: A Novel Taxonomy. International Journal of Information Technology Volume 2 Number 2.

Jack Snoeyink, Subhash Suri, George Varghese. A Lower Bound for Multicast Key Distribution. IEEE INFOCOM 2001.

W.Stallings Network and Internetwork Security. Prentice Hall Inc.,1995.

Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal Survey and Comparison of Secure Group Communication Protocols.

B.Parvatha Varthini and S.Valli An Efficient Group Rekeying Method Using Enhanced One Way Function Tree Protocol. IJCSNS International Journal of Computer Science and Network Security. VOL.6 No.12.December 2006.

L.C.Paulson The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Society, 6:85-128, 1998.

Graham Steel, Alan Bundy. Attacking Group Multicast Key Management Protocols Using CORAL. ARSPA 2004 Preliminary Versions.

K.P.Birman and T.Joseph Exploiting Virtual Synchrony in Distributed Systems.. Proc.11th Ann.Symp. Operating Systems Principles, pp.123-138, Nov.1987.

Yair Amir, Member, IEEE Computer Society, Yongdae Kim, Cristine Nita-Rotaru, Member, IEEE, John L.Schultz, Jonathan Stanton,Member, IEEE Computer Society, and Gene Tsudik, Member, IEEE Secure Group Communication Using Robust Contributory Key Agreement.

M.Burmester and Y.Desmedt. A Secure and Efficient Conference Key Distribution System. Advances in Cryptology- EUROCRYPT’94, May 1994.

S.Benson Edwinraj, J.Jeffneil Lalith.A Novel approach for computation-Efficient Rekeying for multicast key Distribution. Ljcsns. International Journal of computer science and Network S Security, Vol.9.NO.3,March 2009.

Ch.Aswani Kumar, R.Sri Lakshmi and M.Preethi. Implementing Secure Group Communications using Key Graphs. Defence ScienceJournal,Vol.57.No.2, March 2007.pp.279-286. 2007. DESIDOC. Revised November 2005.

Senior member IEEE, Larry Korba, George O.M.Yee, Senior member,IEEE. Ronggong Song, A Scalable Group Key Management Protocol 2008.

Jyh-How Huang and Shivakant Mishra.A Highly Scalable Key Distribution Protocol for Large Group Multicast 2003.

Protocols David Manz, Jim Alves-foss and Shanyin Zheng Network Simulation of Group Key Management 2008.

Rong H Rahman and Lutfar Rahman A New Group Key Management Protocol for Wireless Ad-Hoc Networks 2008.

Xiaozhou Steve Li, Yang Richard Yang, Mohamed G Gouda, Simson S Lam Batch Rekeying For Secure Group Communication 2001.

Ing-Ray Chen, Jin-Heecho, Ding-Chau Wang Performance Characteristics of Region Based Group Key Management in Mobile Adhoc Networks 2006.

C.Zhang, B.Decleene, J.Kurose, D.Towsley. Comparison Of Inter Area Rekeying Algorithms For Secure Wireless Group Communications Performance Evaluation Vol.49, No.1-4, 2002, pp.1-20.

M.Steiner, G.Tsudik and M.Waidner, Diffie- Hellman Key Distribution Extended To Group Communication 3rdACM Conference On Computers And Communications Security, Pages 31-37, March 1996.

R.Monry and M.Carrille On Automating The Formulation Of Security Goals Under The Inductive Approach. In M.H.Hamza Editor, Applied Informatics, Pages 1020- 1025.Iasted/Acta Press, 2003.

T.M.Cover and J.A.Thomas, Elements of Information Theory. John Wiley and Sons, 1991.

Wei-Chi Ku And Shuai-Min Chen, ”An Improved Key Management Schemes For Large Dynamic Groups Using One-Way Function Trees”.Proceedings of Icppw’03, Oct 2003, Pp.391-396.

L.E.Moser, Y.Amir, P.M.Melliar-Smith, And A.Agarwal, ”Extended Virtual Synchrony”, Proc. IEEE 14th International Conference Distributed Computing Systems. Pp.56-65, June 1994.

W.Diffie and M.E.Hellman, ”New Directions in Cryptography, ’IEEE Trans. Inform Theory, Vol.IT-22, Pp.644-654, Nov 19976.

R.C.Merkle A Certified Digital Signature. Proceedings of Advances in Sryptology- Crypto’89, Pp.241-250, 1989.

C.Neumand and T.Theodors Kerberos: An Authentication Service for Computer Networks IEEE Communication, 32{9}, September 1994.

Y.Kim, A.Perring And G.Tsudik Tree-Based Group Key Agreement ACM Transactions On Information And System Security, 7(1): 60-96,Feb 2004.

S.Rafaeli and D.Hutchison, “Hydra A Decentralized Group Key Management “11th IEEE International WETICE: Enterprise Security Workshop, June 2002.

M.J.Moyer, J.R.Rao And P.Rohatgi, Maintaining Balanced Key Trees For Secure Multicast, INTERNET-DRAFT, June 1999. [50] O.Rodeh, K.Birman and D.Dolev, “Using AVL Trees for Fault Tolerant Group Key Management” Cornell University, Computer Science,Technical Report 2000- 45, 2000.

R.Aparna and B.B.Amberker, Key Management Scheme for Multi-Layer Secure Group Communication, 2009.

Xinliang Zheng, Chin-Tser Huang and Manton M Matthews,Centralized and Decentralized Group Key Management, 2007.

Rakesh Chandra Gangwar, Secure and Efficient Decentralized Group Key Establishment Protocol For Robust Group Communication, Journal of Theoretical and Applied Information Technology, 2005 - 2008 JATIT.

Mark Manulis, Security-Focused Survey on Group Key Exchange Protocols, Horst Goetz Institute for IT- Security Ruhr University Bochum, November 2006.

Naga Naresh Karuturi_; x, Ragavendran Gopalakrishnan_, Rahul Srinivasany and Pandu Rangan Chandrasekaran. Foundations of Group Key Management — Framework, Security Model and a Generic Construction.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.