Skip to main content
Log in

An Efficient and Secure Self-Healing Scheme for LKH

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

With the growing interest in converging fixed and mobile networks (FMC), mobile applications will require more and more resources from both the network and the mobile device. In such context, multicasting is essential because it lowers bandwidth consumption by simultaneously reaching a group of multiple recipients. Securing multicast flows has been extensively studied in the past, but none of the existing solutions were meant to handle the constraints imposed by mobile scenarios, in particular the high packet-loss rate. The need for a low overhead self-healing rekeying mechanism that is scalable, reliable and suitable for mobile environments has never been more urgent than with the arrival of FMC in 4G networks. This paper presents two self-healing recovery schemes based on the dual directional hash chains (DDHC) for the logical key hierarchy (LKH) rekeying protocol. This enables a member that has missed up to m consecutive key updates to recover the missing decryption keys without asking the group controller key server (GCKS) for retransmission. Conducted simulations show considerable improvements in the ratio of decrypted messages and in the rekey message overhead in high packet loss environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Cuadra-Sanchez, A., Casas-Caballero, C.: End-to-end quality of service monitoring in convergent iptv platforms. Next Generation Mobile Applications, Services and Technologies, International Conference on 2009; 0, 303–308

  2. Acosta, A.A.R., Garcia-Vázquez, M.S., Colores-Vargas, J.: Mpeg-4 avc/h.264 and vc-1 codecs comparison used in iptv video streaming technology. CERMA ’08: Proceedings of the 2008 Electronics, Robotics and Automotive Mechanics Conference, IEEE Computer Society: Washington, DC, USA, pp. 122–126 (2008)

  3. Weifeng, C., Dondeti, L.R.: Performance comparison of stateful and stateless group rekeying algorithms. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 8, 186–195 (2008)

    Google Scholar 

  4. Zhu, S., Setia, S., Jajodia, S.: Adding reliable and self-healing key distribution to the subset difference group rekeying method. In: Group Communications and Charges: Technology and Business Models. Proceedings of the 5th COST 264 International Workshop on Networked Group Communications, NGC 2003, pp. 107–118 (2003)

  5. Zhu, S., Jajodia, S.: Scalable group rekeying for secure multicast: a survey. pp. 1–10 (2003)

  6. Ioannidis, J., Keromytis, A.D., Yung, M. (eds.): Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7–10, 2005, Proceedings, Lecture Notes in Computer Science, Vol. 3531, (2005)

  7. Chen, W., Dondeti, L.: Recommendations in using group key management algorithms. DARPA Information Survivability Conference and Exposition, 2003. Proceedings, Vol. 2, pp. 222–227 (2003)

  8. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458

  9. Perrig, A., Song, D., Tygar, J. Elk: a new protocol for efficient large-group key distribution. pp. 247–262 (2001)

  10. Raj, S.B.E., Lalith, J.J.: A novel approach for computation-efficient rekeying for multicast key distribution. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 9, 279–284 (2009)

    Google Scholar 

  11. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. RFC 2627, Internet Engineering Task Force 1999. http://www.faqs.org/rfcs/rfc2627.html

  12. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30

  13. Cho, T., Lee, S.H., Kim, W.: A group key recovery mechanism based on logical key hierarchy. J. Comput. Secur. 12(5), 711–736 (2004)

    Google Scholar 

  14. Zhang, X., Lam, S., Lee, D.Y., Yang, Y.: Protocol design for scalable and reliable group rekeying. IEEE/ACM Trans. Netw. 11(6), 908–922 (2003)

    Article  Google Scholar 

  15. Setia, S., Zhu, S., Jajodia, S.: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. pp. 21–41 (2002)

  16. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. pp. 241–257 (2002)

  17. Blundo, C., D’Arco, P., De Santis, A., Stinson, D.: On unconditionally secure distributed oblivious transfer. J. Cryptol. 20(3), 323–373 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  18. Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), (2003)

  19. Hong, D., Kang, J.S.: An efficient key distribution scheme with self-healing property. Commun. Lett. IEEE 9(8), 759–761 (2005)

    Article  Google Scholar 

  20. More, S.M., Malkin, M., Staddon, J., Balfanz, D.: Sliding-window self-healing key distribution. SSRS ’03: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems, pp. 82–90 (2003)

  21. Padro, C., Sáez, G., Villar, J.L.: Detection of cheaters in vector space secret sharing schemes. Des. Codes Cryptogr. 16(1):75–85 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  22. Tian, B., Han, S., Dillon, T.S., Das, S.: A self-healing key distribution scheme based on vector space secret sharing and one way hash chains (2008)

  23. Dutta, R., Wu, Y.D., Mukhopadhyay, S.: Constant storage self-healing key distribution with revocation in wireless sensor network. pp. 1323–1328 (2008)

  24. Dutta, R., Chang, E.C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. pp. 385–400 (2007)

  25. Kausar, F., Hussain, S., Park, J.H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. pp. 737–748 (2007)

  26. Shi, M., Shen, X., Jiang, Y., Lin, C.: Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wireless Communications 14(5), 38–46 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angelo Rossi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rossi, A., Pierre, S. & Krishnan, S. An Efficient and Secure Self-Healing Scheme for LKH. J Netw Syst Manage 18, 327–347 (2010). https://doi.org/10.1007/s10922-010-9166-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-010-9166-9

Keywords

Navigation