The VersaKey framework: versatile group key management (original) (raw)

A scalable and reliable key distribution protocol for multicast group rekeying

2002

ABSTRACT Scalable group rekeying is one of the important problems that needs to be addressed in order to support secure communications for large and dynamic groups. One of the challenging issues that arises in scalable group rekeying is the problem of delivering the updated keys to the members of the group in a reliable and timely manner. In this paper, we present a new scalable and reliable key distribution protocol for group key management schemes that use logical key hierarchies for scalable group rekeying.

DM-GKM: A key management scheme for dynamic group based applications

Computer Networks, 2020

In recent years, group-based applications (GBAs) have gained popularity due to their interesting and promising functionalities such as video on demand, teleconferencing, and pay per view. The advancements in wireless networks and the emergence of mobile devices such as smartphones and tablets have also increased the demands for GBAs. However, the implementation of group key management protocols for GBAs leads to significant computational, storage and communication overheads as well as potential system bottlenecks due to the high mobility of group members. The goal of this research is to address these issues and design a lightweight key management framework that requires fewer computations of keys for dynamic mobile users. A new group key management framework is proposed in this research, which is called the "DynaMic Group Key Management" (DM-GKM) framework. This framework exploits the advantages of the asymmetric key cryptosystem in order to guarantee security and it alleviates the rekeying overhead and distributing the independent Group Key (GK) for each cluster. Simulation and performance analysis demonstrates that the DM-GKM framework fulfils the requirements of a lightweight key management framework for large, dynamic groups of users. An analytical model is also developed to determine the performance and security features of the proposed framework. gaming, military communication and Internet Protocol television (IPTV), which inspires the development of group communication [1,2]. Group communication allows a host to send data simultaneously to a group of other hosts. This phenomenon prevents the establishment of point-to-point connections amongst the group. Nowadays, application-level group communication has superseded point-to-point communication since it provides the same functionality at a lower cost with minimal deployment efforts. Application-level group communication becomes easier with the advent of wireless mobile technologies which provide efficient installation and compatibility between different services. In general, GBAs require a secure communication channel to avoid disclosure of information to unauthorized users. However, group based communications make use of an open wireless network which is vulnerable to several attacks, resulting in an insecure communication environment. For example, security is of utmost importance in private conferences due to the provision of data confidentiality in a dynamic group membership. This means that only the authorized group members can properly access the data. For this reason, it is necessary to have an efficient key management mechanism, which can efficiently manage a large, dynamic group of mobile users. Key management methods are used for secure key generation and immediate revocation of keys whenever there is a change in the membership. GKs are used for security and privacy reasons, whereby the GKs are shared amongst users of the group as an access control mechanism. A message is encrypted only once for the group and the message is then transmitted to the group and further decrypted using the GK. The data traffic is encrypted with a single key and this key is then distributed to the group using one of the several mechanisms. The GKMP serves to generate, update and distribute the GK and private keys of the users

Hybrid Key Management for Group Communications

The International Conference on Electrical Engineering, 2006

Due to the increased popularity of group oriented applications and protocols, securing group communications has become a critical networking issue and has received much attention in recent years. A secure and efficient group key management protocol is the most fundamental challenge in group communication security. While key transport protocols may be appropriate for key establishment in large networks, many collaborative applications require distributed key agreement protocols. Proposals for key agreement protocols that have been published so far does not scale for large size group. In this paper we propose a novel framework for scalable key management protocols in group communication, using both Key Agreement and Key transport protocols. Our framework is based on a particular clustering of the members of the secure communicating group into subgroups. We describe a protocol to achieve this clustering scheme. We describe the architecture and operation of this framework using GDH.2 as a building block. We show that our framework is scalable to large groups with frequent membership changes. 1 Introduction With the widespread use of the Internet, The popularity of Group communication based applications has grown considerably. Group communication is a means of providing multi-point to multi-point communication by organizing processes in groups. Current group-oriented applications include Internet video transmission, stock quotes, news feeds, software updates, live multi-party conferencing, online video games, collaborative workspaces and traversal of insecure networks, basic security services-such as traffic integrity, entity authentication, and

A scalable extension of group key management protocol

The Center for Satellite and Hybrid Communication Networks is a NASA-sponsored Commercial Space Center also supported by the Department of Defense (DOD), industry, the State of Maryland, the University of Maryland and the Institute for Systems Research. This ...

CAKE: An Efficient Group Key Management for Dynamic Groups

2019

With rapid increase of mobile computing and wireless network linkage, the information exchange between connected systems and within groups increases heavily. Exchanging confidential information within groups via unsecured communication channels is a high security threat. In order to prevent third parties from accessing this data, it is essential to encrypt it. For this purpose, the group participants need a common group key to enable encrypted broadcast messages. But efficient key management of secured group communication is a challenging task, if participants rely on low performance hardware and small bandwidth. For coordination and distribution, we present the modular group key management procedure CAKE that is centrally organized and meets strict security requirements. The lightweight G-IKEv2 protocol in combination with the key exchange concept of CAKE leads to an efficiently integrated solution. The hybrid approach combines the advantages of the existing protocols with the objective to reduce the computation and communication effort. It is shown that the procedure is more suitable for changing MANET groups than the existing ones. Moreover, the exchanged group key can be used for any services which provides a wide range of applications.

SGKMP: A scalable group key management protocol

Sustainable Cities and Society, 2018

The Online Social Network (OSN) has changed the ways of communication among users from one-to-one toward the group communication. The users of a particular group are interested in communicating securely among the group members using secure group key. Although the data remains secure during the transmission when it is encrypted with the group key, however, the group key management and generation is a challenge while using the insecure channel and untrusted server. The contributory key management is a solution in such situations, but the creation process of the group key, among the group members itself, is a challenge. In the literature, the contributory key generation requires at least n rounds to accomplish the group key generation process. Modification in a group requires the re-keying process for backward and forward security, and it also needs the same number of rounds again. In this paper, a scalable group key management protocol (SGKMP) is proposed, which requires only two rounds to complete the group key generation process, irrespective of group size and it is secure from the eavesdropper in the middle. The backward and forward secrecy is maintained when any user joins or leaves the group while doing a single activity by the group leader. The proposed protocol is implemented using Java as a programming language in order to validate the applicability of the protocol.

Adaptive Secured Multicast Key Management with Re-Keying Process

2016

Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW). Group communication must strike a balance between how quickly data is exchanged among users, at the same time, data security must not be compromised. Hence, protocols are in place to ensure data security in a cryptographic group by encrypting data before sending it to users. A separate transaction takes place with a key to decrypt the data. As the users grow in numbers, the key management becomes harder and complex in nature. Herein, Logical Key Hierarchy (LKH) has been proposed for a cryptographic group. A thorough analysis of the prevailing key management systems has been conducted. Few surveys have been researched and analyzed. Fundament security systems have been tested in real-life settings. A key management system needs to be in place that sharpens data security but provides users with quick service. Group Secure Association Key Management Protocol (GSAKMP) has been widely used. But online transaction and group that are geographically spread pose a different challenge. Hence, a proposal has been adopted to manage keying and rekeying for the members of a cryptographic group.

Key Management for Secure Multicast Communications

Providing key management schemes for large scale multicast groups has become an important problem due to many potential commercial applications such as stock quote and software distribution on the Internet. For secure multicast communication, all the group members have to share a common session key.

Broadcast group key management with access control vectors

2010

Abstract Secure collaborative applications currently enabled by the Internet need flexible and efficient mechanisms for managing and distributing group keys. The secure transmission of information among collaborating users should be efficient as well as flexible in order to support access control models with different granularity levels for different kinds of applications such as secure group communication, secure dynamic conferencing, and selective/hierarchical access control disseminated information.