Abstract
In secure group communication for applications such as pay-per-view, teleconferencing, and video conferencing, key management method with logarithmic computation is expected along with storage and bandwidth efficiency. Major aspects with key management are formation of group key with initial group members and updating the group key with any change in number of group members. Rekeying is mandatory due to group join/leave operations or periodic rekeying. Logical Key Hierarchy has logarithmic rekeying cost. This paper explores Logical Key Hierarchy (LKH), LKH variants with centralized and distributed approach are analyzed and presented. This paper explores their way of achieving and persisting logarithmic cost for secure group communication, to decide the suitable method for a current application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. IETF, RFC 2627 (1999)
Yu, X.: Survey on the hierarchical key distribution algorithms for secure multicasting. http://www.comp.nus.edu.sg/~cs5248/surveys/xusecure-key.pdf
Kruus, P.S.: A survey of multicast security issues and architectures. In: 21st National Information Systems Security Conference, Arlington, VA, Oct 1998
Pande, A.S., Thool, R.C.: Survey on logical key hierarchy for secure group communication. In: IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Sept 2016, pp. 1131–1136
Harney, H., Harder, E.: Logical key hierarchy protocol. draft-harney-sparta-lkhp-sec-00.txt. IETF Internet Draft (1999)
Diot, C., Levine, B.N., Lyles, B., Kassel, H., Balensiefen, D.: Deployment issues for the IP multicast service and architecture. IEEE Netw. 14, 78–88 (2000)
Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)
Wong, C.K., Gauda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)
Zhu, S., Jajodia, S.: Scalable group key management for secure multicast: a taxonomy and new directions. http://www.cse.psu.edu/~szhu/papers/survey.pdf
Goshi, J., Ladner, R.E.: Algorithms for dynamic multicast key distribution trees. In: Proceedings of ACM Symposium on Principles of Distributed Computing (PODC) (2003)
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initializations. IETF Draft, Aug 2000
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: IEEE INFOCOM, New York, vol. 2, pp. 708–716, Mar 1999
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE J. Sel. Areas Commun. 17/8 1614–1631 (1999)
Zhu, W.T.: Optimizing the tree structure in secure multicast key management. IEEE Commun. Lett. 9(5) (2005)
Joshi, M., Bichkar, R.: A centralized key table based communication efficient group key management protocol. Int. J. Comput. Netw. Inf. Secur. (8), 49–55 (2015)
Rodeh, O., Birman, K., Doley, D.: Optimized group rekey for group communication systems. Technical Report 2, Department of Computer Science, Hebrew University (1999)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault tolerant key agreement for dynamic collaborative groups. In: Proceedings of 7th ACM Conference in Computer and Communication Security, pp. 235–241, Nov 2000
Huang, J.H., Mishra, S.: Mykil: a highly scalable key distribution protocol for large group multicast. In: IEEE Global Communications Conference (2003)
Mitrra, S.: Iolus: a framework for scalable secure multicasting. In: ACM SIGCOMM, pp. 277–288 (1997)
Setiya, S., Koussih, S., Jajodiya, S.: Kronos: a scalable group rekeying approach for secure multicast. In: Proceedings of IEEE Symposium on Security and privacy (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pande, A.S., Joshi, Y., Joshi, M.Y. (2019). Analysis on Logical Key Hierarchy and Variants for Secure Group Communication. In: Iyer, B., Nalbalwar, S., Pathak, N. (eds) Computing, Communication and Signal Processing . Advances in Intelligent Systems and Computing, vol 810. Springer, Singapore. https://doi.org/10.1007/978-981-13-1513-8_44
Download citation
DOI: https://doi.org/10.1007/978-981-13-1513-8_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1512-1
Online ISBN: 978-981-13-1513-8
eBook Packages: EngineeringEngineering (R0)