Skip to main content

TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3464 Accesses

Abstract

Many emerging applications like audio/video conferencing, stock quote updates, interactive gaming etc., require secure group communication. In these group based applications, data is to be delivered from one or more legitimate sources to a group of legitimate receivers. The critical issue in any group communication protocols is that the group membership is highly dynamic with frequent member addition and member eviction. Security can be achieved only though the renewing of the existing key material with every possible event like member addition and member leave. As these events are performed more often, the renewing and distribution of the key material to the entire group should be done in an efficient and scalable manner. Any network application requires minimum computational and communication costs. Generally with cryptographic protocols the computation cost is influenced by the number of encryptions/decryptions. This paper proposes two protocols one using the broadcast ring and the other using the combination of the ring and tree based protocol to minimize the communication overhead as well as computation burden.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Architecture. RFC 2093 (July 1997)

    Google Scholar 

  2. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. RFC 2094 (July 1997)

    Google Scholar 

  3. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using key Graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  4. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  5. McGrew, D.A., Sherman, A.T.: Key establishment in Large Dynamic Groups using One-Way Function Trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)

    Article  Google Scholar 

  6. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications (Special Issues on Middleware) 17(8), 1614–1631 (1999)

    Article  Google Scholar 

  7. Inoue, D., Kuroda, M.: FDLKH: Fully Decentralized Key Management scheme on a Logical Key Hierarchy. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 339–354. Springer, Heidelberg (2004)

    Google Scholar 

  8. Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)

    Google Scholar 

  9. Chaddoud, G., Chrisment, I., Shaff, A.: Dynamic Group Communication Security. In: 6th IEEE Symposium on Computers and Communication (2001)

    Google Scholar 

  10. Oppliger, R., Albanese, A.: Distributed registration and key distribution (DiRK). In: Proceedings of the 12th International Conference on Information Security IFIP SEC 1996 (1996)

    Google Scholar 

  11. Rafaeli, S., Hutchison, D.: Hydra: a decentralized group key management. In: 11th IEEE International WETICE: Enterprise Security Workshop (June 2002)

    Google Scholar 

  12. Bobba, R., Khurana, H.: DLPKH: Distributed Logical Public Key Hierarchy. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 110–127. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Ingemarson, I., Tang, D., Wong, C.: A Conference Key Distribution System. IEEE Transactions on Information Theory 28(5), 714–720 (1982)

    Article  Google Scholar 

  14. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: 3rd ACM Conference on Computer and Communications Security, pp. 31–37 (March 1996)

    Google Scholar 

  15. Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.: Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups. In: Proc. IEEE International Conference on Network Protocols, ICNP (November 2002)

    Google Scholar 

  16. Perrig, A.: Efficient Collaborative Key Management Protocol for Secure Autonomous Group Communication. In: Proc. of International Workshop CrypTEC (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naga Raju, D.V., Valli Kumari, V. (2010). TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics