Browse > Article

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks  

Hur, Jun-Beom (한국과학기술원 전산학과)
Yoon, Hyun-Soo (한국과학기술원 전산학과)
Abstract
Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.
Keywords
many-to-many multicast; Identity-based proxy encryption; Mesh network; secure group key management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys 35 (September 2003), pp.309-329.   DOI   ScienceOn
2 WiMAX Forum, "Mobile WiMAX-Part I: A Technical Overview and Performance Evaluation," February 2006.
3 D. Huang, D. Medhi, A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication, ACM Transactions on Information and System Security 7 (November 2004), pp.1-30.   DOI
4 D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using Oneway Function Trees, Tech. Rep. No. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md.
5 A. N. Pour, K. Kumekawa, T. Kato, S. Itoh, A Hierarchical Group Key Management Scheme for Secure Multicast increasing Efficiency of Key Distribution in Leave Operation, Computer Networks 51 (August 2007), pp.4727-4743.   DOI   ScienceOn
6 D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, in: Proceedings Crypto 2001, Lecture Notes in Computer Science 2139 (August 2001), pp.213-229.
7 E. Fujisaki, T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, in: Proceedings Crypto 1999, pp.537-554.
8 G. M. Bertoni, L. Chen, P. Fragneto, K. A. Harrison, G. Pelosi, Computing Tate Pairing on Smartcards (2005). http://www.st.com/stonline/products/families/smartcard/ches2005\_v4.pdf.
9 D. R. Stinson. Cryptography Theory and Practice (3rd ed.) (Chapman & Hall/CRC, 2006).
10 M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, in: Proceedings ACM CCS (March 1996), pp.31-37.
11 M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Proceedings Crypto'98 (1998) pp.26-45.
12 C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, C.-L. Lei, Secure Multicast in Dynamic Environments, Computer Networks 51 (July 2007), pp.2805-2817.   DOI   ScienceOn
13 L. Dondeti, S. Mukherjee, A. Samal, Scalable Secure One-to-many Group Communication Using Dual Encryption, Computer Communication 23 (July 1999) pp.1681-1701.
14 Y. Tsiounis, M. Yung, On the Security of ElGamal Based Encryption, in: Proceedings International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 1431 (February 1998), pp.117-134.
15 V. S. Miller, The Weil Pairing and Its Efficient Calculation, J. Cryptol. 17 (2004), pp.235-261.
16 Y. Zhang, Y. Fang, A Secure Authentication and Billing Architecture for Wireless Mesh Networks, Wireless Networks 13 (2007), pp.663-678.   DOI   ScienceOn
17 C. K. Wong, M. G. Gouda, and S. S. Lam, Secure Group Communications Using Key Graphs, in: Proceedings ACM SIGCOMM (September 1998), pp.68-79.
18 Y. Chiu, C. Lei, C. Huang, Secure Multicast Using Proxy Encryption, in: Proceedings International Conference on Information and Communications Security, Lecture Notes in Computer Science 3783 (December 2005), pp.280-290.
19 I. F. Akyildiz, X. Wang, W. Wang, Wireless Mesh Networks: A Survey, Computer Networks 47 (March 2005), pp.445-487.   DOI   ScienceOn
20 S. D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate Pairing, in: Proceedings 5th International Symposium on Algorithmic Number Theory, Lecture Notes in Computer Science 2369 (2002), pp.324-337.
21 A. Ivan, Y. Dodis, Proxy Cryptography Revisited, in: Proceedings Network and Distributed System Security Symposium (February 2003).
22 IEEE Std 802.16-2004, Air Interface for Broadband Wireless Access Systems, October 2004.
23 Y. J. Choie, E. Lee, Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2, in: Proceedings ICISC 2003, Lecture Notes in Computer Science 2971 (2004), pp.97-111.
24 J. Hwu, R. Chen, Y. Lin, An Efficient Identitybased Cryptosystem for End-to-end Mobile Security, IEEE Trans. on Wireless Communications 5 (September 2006), pp.2586-2593.   DOI
25 S. Mittra, Iolus: A Framework for Scalable Secure Multicasting, in: Proceeding ACM SIGCOMM (September 1997), pp.277-288.