Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.4.409

The Efficient Group Key Management Blocking Collusion Attack  

Kim, Tae-Gyun (공주대학교 대학원 컴퓨터교육과)
Chung, Jong-In (공주대학교 컴퓨터교육과)
Abstract
Multicast services are provided on the Internet in fast increasing . Therefore it is important to keep security for multicast communication. Member leaving is deeply associated with scalability problem for group key management. If one member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Batch removal can reduce these important parameters rather than removing members sequentially In fashion one after another. In this paper, Hamming distance is calculated between eve교 members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm In the case of removing several members simultaneously, our model has advantages of reducing the number of message and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying.
Keywords
Group Key; Key Management; Collusion Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, 'Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques,' Proceedings of Infocom, New York, March, 1999   DOI
2 C. K. Wong, M. Gouda, S. S. Lam, 'Secure Group Communications using Key Graphs,' Proceedings of ACM SIGCOMM, Vancouver, British Columbia, Sep., 1998   DOI
3 S. Banerjee, B. Bhattacharjee, 'Scalable secure Group Communication over IP Multicast,' Proceedgins of ICNP, Nov., 2001
4 M. Steiner, G. Tsudik, M .Waidner, 'Key Agreement in Dynamic Peer Groups,' IEEE Tr. on Parallel and Distributed Systems, Vol.11, No.8, pp.769-780, 2000   DOI   ScienceOn
5 X. S. Li, Y. R. Yang, M. G. Gouda, S. S. Lam, 'Batch Rekeuing for Secure Group Communications,' WWW10, May, 2001
6 J. F. Wakerly, 'Digital Design Principles and Practices,' Prentice-Hall, 1990
7 http://www.nist.gov/dads/HTML/hammingdist.html
8 W. Diffie and M. Hellman, 'New Directions in Cryptography,' IEEE Tr. on Information Theory, IT-22, pp.644-654, Nov., 1976   DOI
9 A. Ballardie, 'Scalable Multicast Key Distribution,' RFC 1949, May, 1996
10 T. Hardjono, G. Tsudik, 'IP Multicast Security : Issues and Directions,' Annales De Telecom, pp.324-340, July-August, 2000
11 D. Wallner, E. Harder, R. Agee, 'Key Management for Multicast : Issues and Architectures,' RFC 2627, 1999