Abstract
The one-way function tree is an efficient group key management scheme. Many methods have been proposed to improve it against different types of internal attack. However, these previous works have not considered external attacks such as man in the middle. This is a very dangerous attack because it can intervene in the key establishment and key agreement process. This paper proposes a new method to prevent man in the middle attack by combining the OFT scheme with digital signatures scheme which is used to authenticate the participants. Beside, the proposed method can also prevent the collusion attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Trans. Commun. E85–B(5), 1050–1051 (2002)
Maynard, P., McLaughlin, K., Haberler, B.: Towards understanding man-in-the-middle attacks on IEC 60870-5-104 SCADA networks. In: Proceedings of the 2nd International Symposium for ICS and SCADA Cyber Security Research (2014)
Sherman, A.-T., McGrew, D.-A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)
Balenson, D., McGrew, D., Sherman, A.: Key Management For Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Internet Research Task Force (2000)
Wallner, D.-M., Harder, E.-J., Agee, R.-C.: Key Management for Multicast: Issues and Architectures. Internet Engineering Task Force (1998)
Wong, C.-K., Gouda, M., Lam, S.-S.: Secure group communication using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)
Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings International Conference Parallel Processing Workshops, Kaohsiung, Taiwan, pp. 391–396 (2003)
Xu, X., Wang, L., Youssef, A., Zhu, B.: Preventing collusion attacks on the one-way function tree (OFT) scheme. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 177–193. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_12
Liu, J., Yang, B.: Collusion-resistant multicast key distribution based on homomorphic one-way function trees. IEEE Trans. Inf. Forensics Secur. 6(3), 980–991 (2011)
Sun, Y., Chen, M., Bacchus, A., Lin, X.: Towards collusion-attack-resilient group key management using one-way function tree. Comput. Netw. 104, 16–26 (2016)
Zhang, Y., Zheng, Z., Szalachowski, P., Wang, Q.: Collusion-resilient broadcast encryption based on dual-evolving one-way function trees. Secur. Commun. Netw. 9, 3633–3645 (2016)
Jusoh, N.-A., Seman, K., Nawawi, N.-M., Sayuti, M.-S.-M.: The improvement of key management based on logical key hierarchy by implementing Diffie Hellman algorithm. J. Emerg. Trends Comput. Inf. Sci. 3(3) (2012). ISSN 2079-8407
Ali, A.-I.: Comparison and evaluation of digital signature schemes employed in NDN network. Int. J. Embed. Syst. Appl. (IJESA) 5(2), 15–29 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Nguyen, D.T., Le, M.T. (2018). A New Method for Establishing and Managing Group Key Against Network Attacks. In: Nguyen, N., Hoang, D., Hong, TP., Pham, H., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2018. Lecture Notes in Computer Science(), vol 10752. Springer, Cham. https://doi.org/10.1007/978-3-319-75420-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-75420-8_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75419-2
Online ISBN: 978-3-319-75420-8
eBook Packages: Computer ScienceComputer Science (R0)