Skip to main content

Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management

  • Conference paper
  • First Online:
Book cover Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

  • 1325 Accesses

Abstract

Security is an important requirement in reliable group communication over open networks in order to prevent intruder attack. A common secret key called group key is generated for encrypting the group information. A distributed key management methodology based on dynamic decentralized group key agreement protocol is required to handle this issue. Rekeying or new group key generation is based on membership driven or time driven. Rekeying is needed whenever a new single member comes to the group or an existing member goes out. Individual rekeying operations in a large group of users leads to the increase the rate of message exchanges which leads to performance degradation. This paper investigates communication rounds, computation complexity and storage of keys in existing key management schemes and introduces an enhanced decentralized Sub Group Key Management (SGKM) approach which is efficient for rekeying. In the proposed work, a group is fragmented into sub groups and the sub groups are managed with one encryption key and multi decryption key protocol by the respective manager. The performance of proposed algorithm is analyzed under different join and leave possibilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Park, Y.H., Je, D.H., Park, M.H., Seo, S.W.: Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput. 13(4) (2014)

    Google Scholar 

  2. Zhou, J., Song, M., Song, J., Zhou, X.-W, Sun, L.: Autonomic group key management in deep space DTN. Wireless Peers Commun. (2013). doi 10.1007/s11277-013-1505-1

  3. Park, M.H., Jeong, H.Y., Seo, S.W.: Key management for multiple multicast groups in wireless networks. IEEE Trans. Mobile Comput. 12(9) (2013)

    Google Scholar 

  4. Sherman, A., McGrew, D.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Soft. Eng. 444–458 (2003)

    Google Scholar 

  5. Lin, J.C., Huang, K.H., Lai, F., Lee, H.C.: Secure and efficient group key management with shared key derivation. Comput. Stand Interfaces 31(1), 192–208 (2009)

    Article  Google Scholar 

  6. Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Dandon, L., Runtong, Z., Chuanchen, W.: Efficient group key management scheme with hierarchy structure. Chin. J. Electron. 21(2), 249–253 (2012)

    Google Scholar 

  8. Juhyung, S., Jun, S.L., Seung, W.S.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2012)

    Google Scholar 

  9. John, S.P., Samuel, P.: A predictive cluster technique for effective key management in mobile ad hoc networks. Inf. Secur. J. 20(4), 250–260 (2011)

    Google Scholar 

  10. Xiao, P., Jingsha, H., Yingfang, F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 478–480 (2012)

    Google Scholar 

  11. Liao, J., Hui, X.L., Qing, Q.P., Yi, L., Yu, M.W.: A public ley encryption scheme with one-encryption and multi-decryption. Chin. J. Comput. 35(5), 1059–1067 (2012)

    Google Scholar 

  12. Zhou, J., Sun, L., Zhou, X., Song, J.: High performance group merging/splitting scheme for group key management. Wirel. Pers. Commun. 75, 1529–1545 (2014). doi:10.1007/s11277-013-1436-x

    Article  Google Scholar 

  13. Mittra, S.: Iolus: A framework for scalable secure multicasting. ACM SIGCOMM Comput. Commun. Rev. 27(4), 288 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raja Lavanya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Lavanya, R., Sundarakantham, K., Shalinie, S.M. (2016). Cost Effective Rekeying Approach for Dynamic Membership Changes in Group Key Management. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics