Abstract
This paper proposes group management and end-to-end security management based on the horizontal model suitable for group based private systems. The software-defined security controller (SDSC), which is located at the center of the control layer, functions as software-defined networking controller responsible for group management and end-to-end security management. The proposed group key rekeying feature uses the unicast method for distributing the signaling messages among the group members which belong to various heterogeneous networks. This network independent and centralized architecture for group key rekeying is advantageous for the dynamic members to constitute secure group. While the group key management is responsible for securing control signaling messages within the group members, the purpose of the end-to-end security management is to protect the end-to-end data traffic within them. To achieve end-to-end security, this paper uses packet key scheme that collaborates with the group key management. Then, the members of the group-based private system are allowed to receive packet key based security service for their end-to-end data traffic. The packet key scheme is based on the idea that the very short lifetime of the packet key with a relatively small key size can provide high level of security and satisfy the latency requirements especially for real-time applications. Because SDSC handles most of the burden in terms of communication and computational load, the workload for group key and end-to-end security management are dramatically reduced from each group member view point. The additional feature of subgroup key management enables each group member to sustain less workload, which solves the scalability issue for the big size private group.


















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Arkko J, Carrara E, Lindholm F, Norrman K, Naslund M (2004) MIKEY: multimedia internet keying. RFC 3830, RFC Editor, https://tools.ietf.org/rfc/rfc3830.txt
Chang X, Qin Y, Chen Z, Xing B (2012) Zrtp-based trusted transmission of voip traffic and formal verification. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, pp 560–563, https://doi.org/10.1109/MINES.2012.250
Chmaj G, Walkowiak K (2013) A p2p computing system for overlay networks. Future Gener Comput Syst 29(1):242–249. https://doi.org/10.1016/j.future.2010.11.009 (including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures)
Chowdhury NMK, Boutaba R (2010) A survey of network virtualization. Comput Netw 54(5):862–876. https://doi.org/10.1016/j.comnet.2009.10.017
Cuzzocrea A, Fortino G, Rana O (2013) Managing data and processes in cloud-enabled large-scale sensor networks: State-of-the-art and future research directions. In: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, pp 583–588, https://doi.org/10.1109/CCGrid.2013.116
Demestichas P, Georgakopoulos A, Karvounas D, Tsagkaris K, Stavroulaki V, Lu J, Xiong C, Yao J (2013) 5g on the horizon: key challenges for the radio-access network. IEEE Veh Technol Mag 8(3):47–53. https://doi.org/10.1109/MVT.2013.2269187
Ding J, Balasingham I, Bouvry P (2009) Management of overlay networks: A survey. In: 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp 249–255, https://doi.org/10.1109/UBICOMM.2009.49
Hendaoui F, Eltaief H, Youssef H, Trad A (2014) Cgk: A collaborative group key management scheme. In: 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), pp 514–517, https://doi.org/10.1109/HPCC.2014.87
Hsu RH, Lee J (2015) Group anonymous d2d communication with end-to-end security in lte-a. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp 451–459, https://doi.org/10.1109/CNS.2015.7346857
Huang CT, Chang JM (2008) Responding to security issues in wimax networks. IT Prof 10(5):15–21. https://doi.org/10.1109/MITP.2008.110
Jovanovic D, Mladenovic D, Blagojevic D (2011) Implementation of zrtp protocol for protection multimedia session. In: 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers, pp 246–249. https://doi.org/10.1109/TELFOR.2011.6143536
Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80(8):1584–1596. https://doi.org/10.1016/j.jcss.2014.04.023 (special Issue on Theory and Applications in Parallel and Distributed Computing Systems)
Jung Y, Festijo E, Atwood JW (2013) Securing rtp packets using per-packet key exchange for real-time multimedia. ETRI J 35(4):726–729. https://doi.org/10.4218/etrij.13.0212.0549
Kreutz D, Ramos FMV, Verssimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14–76. https://doi.org/10.1109/JPROC.2014.2371999
Mapoka TT (2013) Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int J Comput Appl 84(12):28–38. https://doi.org/10.5120/14629-2985
Matsubara D, Egawa T, Nishinaga N, Kafle VP, Shin MK, Galis A (2013) Toward future networks: aA viewpoint from itu-t. IEEE Commun Mag 51(3):112–118. https://doi.org/10.1109/MCOM.2013.6476874
Park MH, Park YH, Jeong HY, Seo SW (2013) Key management for multiple multicast groups in wireless networks. Mobile Comput IEEE Trans 12(9):1712–1723. https://doi.org/10.1109/TMC.2012.135
Renugadevi N, Swaminathan G, Kumar AS (2014) Key management schemes for secure group communication in wireless networks - a survey. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp 446–450, https://doi.org/10.1109/IC3I.2014.7019627
Rohloff K, Cousins DB, Sumorok D (2017) Scalable, practical voip teleconferencing with end-to-end homomorphic encryption. IEEE Trans Inf Forensics Secur 12(5):1031–1041. https://doi.org/10.1109/TIFS.2016.2639340
Sakarindr P, Ansari N (2010) Survey of security services on group communications. IET Inf Secur 4(4):258–272. https://doi.org/10.1049/iet-ifs.2009.0261
Severi S, Sottile F, Abreu G, Pastrone C, Spirito M, Berens F (2014) M2m technologies: Enablers for a pervasive internet of things. In: 2014 European Conference on Networks and Communications (EuCNC), pp 1–5. https://doi.org/10.1109/EuCNC.2014.6882661
Sezer S, Scott-Hayward S, Chouhan PK, Fraser B, Lake D, Finnegan J, Viljoen N, Miller M, Rao N (2013) Are we ready for sdn? Implementation challenges for software-defined networks. IEEE Commun Mag 51(7):36–43. https://doi.org/10.1109/MCOM.2013.6553676
Sharma S, Krishna CR (2015) An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In: 2015 IEEE International Conference on Computational Intelligence Communication Technology, pp 687–693. https://doi.org/10.1109/CICT.2015.116
Veltri L, Cirani S, Busanelli S, Ferrari G (2013) A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw 11(8):2724–2737. https://doi.org/10.1016/j.adhoc.2013.05.009
Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf Secur 8(3):179–187. https://doi.org/10.1049/iet-ifs.2012.0352
Xingmei X, Jing Z, He W (2013) Research on the basic characteristics, the key technologies, the network architecture and security problems of the internet of things. In: Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, pp 825–828. https://doi.org/10.1109/ICCSNT.2013.6967233
Zhou W, Xu Y, Wang G (2013) Distributed group key management using multilinear forms for multi-privileged group communications. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp 644–650. https://doi.org/10.1109/TrustCom.2013.78
Acknowledgements
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2017R1A2B4006086). This study was also supported by the Research Fund, 2017 of the Catholic University of Korea.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Festijo, E., Jung, Y. & Peradilla, M. Software-defined security controller-based group management and end-to-end security management. J Ambient Intell Human Comput 10, 3365–3382 (2019). https://doi.org/10.1007/s12652-018-0678-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0678-6