Skip to main content

A New Method for Establishing and Managing Group Key Against Network Attacks

  • Conference paper
  • First Online:
Intelligent Information and Database Systems (ACIIDS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10752))

Included in the following conference series:

Abstract

The one-way function tree is an efficient group key management scheme. Many methods have been proposed to improve it against different types of internal attack. However, these previous works have not considered external attacks such as man in the middle. This is a very dangerous attack because it can intervene in the key establishment and key agreement process. This paper proposes a new method to prevent man in the middle attack by combining the OFT scheme with digital signatures scheme which is used to authenticate the participants. Beside, the proposed method can also prevent the collusion attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Trans. Commun. E85–B(5), 1050–1051 (2002)

    Google Scholar 

  2. Maynard, P., McLaughlin, K., Haberler, B.: Towards understanding man-in-the-middle attacks on IEC 60870-5-104 SCADA networks. In: Proceedings of the 2nd International Symposium for ICS and SCADA Cyber Security Research (2014)

    Google Scholar 

  3. Sherman, A.-T., McGrew, D.-A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)

    Article  Google Scholar 

  4. Balenson, D., McGrew, D., Sherman, A.: Key Management For Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Internet Research Task Force (2000)

    Google Scholar 

  5. Wallner, D.-M., Harder, E.-J., Agee, R.-C.: Key Management for Multicast: Issues and Architectures. Internet Engineering Task Force (1998)

    Google Scholar 

  6. Wong, C.-K., Gouda, M., Lam, S.-S.: Secure group communication using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)

    Article  Google Scholar 

  7. Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic groups using one-way function trees. In: Proceedings International Conference Parallel Processing Workshops, Kaohsiung, Taiwan, pp. 391–396 (2003)

    Google Scholar 

  8. Xu, X., Wang, L., Youssef, A., Zhu, B.: Preventing collusion attacks on the one-way function tree (OFT) scheme. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 177–193. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_12

    Chapter  Google Scholar 

  9. Liu, J., Yang, B.: Collusion-resistant multicast key distribution based on homomorphic one-way function trees. IEEE Trans. Inf. Forensics Secur. 6(3), 980–991 (2011)

    Article  Google Scholar 

  10. Sun, Y., Chen, M., Bacchus, A., Lin, X.: Towards collusion-attack-resilient group key management using one-way function tree. Comput. Netw. 104, 16–26 (2016)

    Article  Google Scholar 

  11. Zhang, Y., Zheng, Z., Szalachowski, P., Wang, Q.: Collusion-resilient broadcast encryption based on dual-evolving one-way function trees. Secur. Commun. Netw. 9, 3633–3645 (2016)

    Article  Google Scholar 

  12. Jusoh, N.-A., Seman, K., Nawawi, N.-M., Sayuti, M.-S.-M.: The improvement of key management based on logical key hierarchy by implementing Diffie Hellman algorithm. J. Emerg. Trends Comput. Inf. Sci. 3(3) (2012). ISSN 2079-8407

    Google Scholar 

  13. Ali, A.-I.: Comparison and evaluation of digital signature schemes employed in NDN network. Int. J. Embed. Syst. Appl. (IJESA) 5(2), 15–29 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dao Truong Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, D.T., Le, M.T. (2018). A New Method for Establishing and Managing Group Key Against Network Attacks. In: Nguyen, N., Hoang, D., Hong, TP., Pham, H., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2018. Lecture Notes in Computer Science(), vol 10752. Springer, Cham. https://doi.org/10.1007/978-3-319-75420-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75420-8_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75419-2

  • Online ISBN: 978-3-319-75420-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics