Browse > Article

Bandwidth Efficient Key Management for Secure Multicast in Clustered Wireless Networks  

Shin, Seung-Jae (한국과학기술원 전산학과)
Hur, Jun-Beom (한국과학기술원 전산학과)
Lee, Han-Jin (한국과학기술원 전산학과)
Yoon, Hyun-Soo (한국과학기술원 전산학과)
Abstract
In the near future, various multicast based services will be provided over clustered wireless networks. To provide multicast services in secure manner, multicast messages are encrypted by using group key which is shared by group members. Therefore, various group key management schemes have been introduced until now. Among them, tree based approach is one of the most representative paradigms in group key management. Traditional tree based approaches effectively reduce rekeying message transmissions of the key distribution center. However, they do not consider the network bandwidth used for transmitting the rekeying messages. In this paper, we firstly present formulas that describe bandwidth consumption of tree based group key management scheme. Based on our formulations, we propose a bandwidth efficient key tree management scheme for clustered wireless networks where membership changes occur frequently. Simulation results show that our scheme effectively reduces the bandwidth consumption used for rekeying compared to existing key tree schemes.
Keywords
Key Distribution; Multicast Security; Secure Group Communication; Wireless Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEEI ACM Trans. Networking, vol.8, pp.l6-30, Feb. 2000
2 D. Balenson, D. McGrew, and A. Shennan, "Key management for large dynamic groups: One-way function trees and amortized initialization," Internet Draft Report, Feb. 2000
3 Y. Sun, W. Trappe, and K. Liu, "An efficient ke management scheme for secure wireless multicast," in proc. IEEE Int. Corif', Communications, ICC 2002, New York City, CA, May 2002, pp. 1236-1240
4 L. Lazos and R. Poovendran, "Power proximity based key management for secure multicast in ad hoc networks," ACMISpringer J Wireless Networks (WINETJ), vol.l3. no.1, pp.127-148, Feb. 2007   DOI   ScienceOn
5 J. Salida, L. Lazos, and R. Poovendran, "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach," IEEE/ ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004   DOI   ScienceOn
6 Y. Sun and K. Liu, "Hierarchical group access control for secure multicast communications," IEEE/ ACM Trans. Networking, vol.15, no.6, pp. 1514-1526, Dec. 2007   DOI   ScienceOn
7 L. Lazos, J. Salido, and R. Poovendran, "VP3: using vertex path and power proximity for energy efficient key distribution," in Proc. IEEE Vehicular Technology Corif'" VTC 2004, Los Angeles, CA, Sep. 2004, pp.1228-1232
8 Y. Kim, A. "Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in proc. of the 7th ACM Conference in Computer and Communication Security, CCS 2000, Athens, Greece, Nov. 2000, pp. 235-241
9 J. Robinson, E. Knightly, "A perfonnance study of deployment factors in wireless mesh networks," in proc. IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp.2054-2062
10 L. Lazos and R. Poovendran, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks," in proc. IEEE Int. Corif', Communications, ICC 2004, Paris, France, pp.3633-3639, May 2004
11 D. R. Stinson, Cryptography - Theory and Practice, 3rd Ed., Chapman & Hall/CRC, 2006
12 R. Canetti, J. Garay, G. Itlus, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in proc. IEEE INFO COM, vol.2, Mar. 1999. pp.708-716
13 M. M. Zonoozi and P Dassanayake, "User mobility modeling and characterization of mobility patterns," IEEE J. Selected Areas Commun., vol.15, pp.1239-1252, Sept. 1997   DOI   ScienceOn
14 W. Trappe, J. Song, R. Poovendran, and K. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol.5, no.4, pp.544-557, Dec. 2003   DOI   ScienceOn
15 Y. Sun, W. Trappe, and K. Liu, "Topology-aware key management schemes for wireless multicast," in proc. IEEE Global Telecommunications Corif',. GLOBECOM'02, San Francisco, CA, Dec. 2003. pp.1471-1475
16 Y. Vardi, "Metrics useful in network tomography studies," IEEE Signal Process. Lett., vol.11, no.3, pp.353-355, Mar. 2004   DOI   ScienceOn
17 http://grouper.ieee.org/ groups/S02/11IReports/tgs_update.htm
18 L. Lazos and R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographical location information," in proc. IEEE ICASSP 2003, Hong Kong, China, April 2003, pp.201-204
19 D. Wallner, E. Harder, and R. Agee, "Key management for multicast: issues and architectures," Internet Draft (RFC 2627)} , Sep. 1998
20 Y. Sun, W. Trappe, and K. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004   DOI   ScienceOn
21 A. Hayter, Probabiliby and statistics for engineers and scientists, Thomson Brooks/Cole, 2007