Browse > Article

Military Group Key Management for Mobile and Secure Multicast Communications  

Jung, Youn-Chan (가톨릭대학교 정보통신전자공학부 통신네트워크 연구실)
Abstract
In mobile and secure military networks, full-meshed IPSec tunnels, which do correspond to not physical links but logical links between each IPSec device and its peer, are required to provide multicast communications. All IPSec devices need support in changing IPSec tunnels by a way of using a multicast group key which is updated dynamically. Tactical terminals, which often constitute a group, need also secure multicast communications in the same group members. Then, the multicast group key is required to be updated dynamically in order to support group members' mobility. This paper presents challenging issues of designing a secure and dynamic group key management of which concept is based on the Diffie-Hellman (DH) key exchange algorithm and key trees. The advantage of our dynamic tree based key management is that it enables the dynamic group members to periodically receive status information from every peer members and effectively update a group key based on dynamically changing environments.
Keywords
Military Networks; IPSec Tunnels; Tactical Terminals; Multicast Communications; Group Key Management; Key Tree;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Aurisch, "Using key trees for securing military multicast communication", IEEE Milcom 04, 2004
2 T. Aurisch, "Optimization Techniques for Military Multicast Key Management," IEEE MILCOM, Vol.4, pp.2570-2576, 2005
3 A. Perrig, D. Song, and J. Tygar, "ELK, a new protocol for efficient large-group key distribution," IEEE Security and Privacy Symposium 2001, May. 2001
4 정윤찬, 임진우, 김석중, 권오주, "군 네트워크에서 멀티케스트 기반의 키 관리 기법 설계,"제12차 통신/전자 학술대회 프로시딩, 국방과학연구소(서울) 10월 2008
5 Trung H. Tran, "Proactive Multicast-based IPSec Discovery Protocol and Multicast Extension," IEEE MILCOM, pp.1-7, Oct. 2006
6 T. Aurisch, "Using key trees for securing military multicast communication" IEEE MILCOM, Vol.3, pp.1377-1383, 2004
7 C. Wong, M. Gouda, and S. Lam, "Secure Group Communications using Key Graphs," ACM SIGCOMM'98, 1998
8 RFC 2627, D. Wallner, E. Harder and R. Agee "Key Management for Multicasts: Issues and Architectures,", Jun. 1999
9 S. Rafaeli, L. Mathy, and D. Hutchison, "EHBT: An efficient protocol for group key management," Third International COST Workshop (NGC 2001), Nov. 2001
10 RFC 2409, "The Internet Key Exchange (IKE)," Nov. 1998[2]
11 RFC 2407, "The Internet Security Association Key Management Protocol," Nov. 1998
12 C. K. Wong, M. G. Gouda, S. S. Lam, "Secure group communications using key graphs," ACM SIGCOMM'98, 1998
13 INSC2/TASK2/DU/003, "Secure Multicast Architecture," Aug. 2004
14 INSC II/TASK1/D/002, "Test and Demonstration Architecture," Feb. 2005