Browse > Article
http://dx.doi.org/10.3837/tiis.2013.04.016

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication  

Vijayakumar, P. (Department of Computer Science and Engineering, University College of Engineering Tindivanam)
Bose, S. (Department of Computer Science and Engineering, Anna University Chennai)
Kannan, A. (Department of Information Science and Technology, Anna University Chennai)
Jegatha Deborah, L. (Department of Computer Science and Engineering, University College of Engineering Tindivanam)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.4, 2013 , pp. 878-894 More about this Journal
Abstract
Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.
Keywords
Multicast Communication; Key Distribution; One Way Hash Function; Computation Complexity; Karatsuba Multiplication;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Wade Trappe, Jie Song, Radha Poovendran, Ray Liu K J, "Key management and distribution for secure multimedia multicast," IEEE Transactions on Multimedia,Vol.5,No.4, pp. 544-557, 2003.   DOI   ScienceOn
2 Xianjin Fang, Longshu Li, "On karatsuba multiplication algorithm," in Proc. of 7th Int. Data, Privacy, and E-Commerce Symp., Washington, DC, USA, pp. 274-276, 2007.
3 Tom St Denis, "Bignum math implementing cryptographic multiple precision arithmetic," SYNGRESS Publishing, 2003.
4 Meftah,S., Razali,R., Samsudin,A., Budiator,R., "Enhancing public-key cryptosystem using parallel karatsuba algorithm with socket programming," in Proc. of 9th Asia-Pacific Conference on Coomunication, Penang, Malaysia, September 21-24, pp. 706-710, 2003.
5 Jebelean,T., "Using the parallel karatsuba algorithm for long integer multiplication and division," in Proc. of European Conference on Parallel Processing, in Lecture Notes in Computer Science, pp. 1169-1172, 1997.
6 Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "An effective key distribution protocol for secure multicast communication," in Proc. of IEEE International Conference on Advanced Computing, Chennai, December 14-16, pp. 102-107, 2010.
7 Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No.6, pp.689-705, 2010.   DOI   ScienceOn
8 Bezawada Bruhadeshwar, Kishore Kothapalli, "A family of collusion resistant symmetric key protocols for authentication," ICDCN, pp. 387-392, 2008.
9 Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya, "Reducing the cost of session key establishment," ARES, pp. 369-373, 2009.
10 Bezawada Bruhadeshwar, Kishore Kothapalli, Poornima,M., Divya,M., "Routing protocol security using symmetric key based techniques," ARES, pp. 193-200, 2009.
11 MacWilliams,F.J., and Sloane,N.J.A., "The theory of error correcting codes," North-Holland Math. Library,1977.
12 Adrian Perrig, Dawn Song, Tygar,J.D., "ELK: a new protocol for efficient large-group key distribution," in Proc. of IEEE Symposium on Security and Privacy Symposium, pp. 247-262, 2001.
13 Harney,H., Harder,E., "Logical key hierarchy protocol," Internat Draft, IETF, Expired in August 1999.
14 Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012.
15 Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012.
16 Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "A secure key distribution protocol for multicast communication," Balasubramaniam P. (eds.) Gandhigram-India, CCIS.,Vol.140, Springer, Heidelberg, 2011, pp. 249-257.
17 Vijayakumar,P., Bose,S., Kannan,A., "Centralized Key Distribution Protocol using the Greatest Common Divisor Method," Computers & Mathematics with Applications, Elsevier, Article Online.
18 Mingyan Li, Poovendran,R., David McGrew,A., "Minimizing center key storage in hybrid one-way function based group key management with communication constraints," Elsevier, Information Processing Letters, Vol.93, No.4, pp. 191-198, 2004.
19 Patrick P.C Lee, John C. S Lui, David K.Y Yau, "Distributed collaborative key agreement protocols for dynamic peer groups," in Proc. of the IEEE International Conference on Network Protocols, pp. 322, 2002.
20 Lihao Xu, Cheng Huang, "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19,No.5, pp. 1-10,2008.   DOI   ScienceOn
21 Wade Trappe, Jie Song, Radha Poovendran, K. J Ray Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1449-1452, 2001.
22 Lee,J.S., Son,J.H., Park, Y.H.,Seo,S.W., "Optimal level-homogeneous tree structure for logical key hierarchy," in Proc. of IEEE Conference on Communication System Software and Middleware Workshop (COMSWARE), 2008.
23 Poovendran,R., Baras,J.S., "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Transactions on Information Theory, Vol. 47, No.7, pp. 2824-2834, 2001.   DOI   ScienceOn
24 Dong-Hyun Je, Jun-Sik Lee, Yongsuk Park, Seung-Woo Seo, "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Elsevier, Computer Communications, Vol.33, No.6, pp. 136-148, 2010.   DOI   ScienceOn
25 Wong, C., Gouda,M., and Lam,S., "Secure group communications using key graphs, IEEE/ACM Transactions on Networking," Vol. 8, No.1, pp.16-30, 2000.   DOI   ScienceOn
26 David,A., McGrew and Alan T. Sherman, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on software engineering, Vol.29,No.5, pp. 444-458, 2003.   DOI   ScienceOn