M-CLIQUES: Modified CLIQUES key agreement for secure multicast

https://doi.org/10.1016/j.cose.2006.11.001Get rights and content

Abstract

In secure multicast applications, members may join or leave frequently and key management is one of the most challenging problems. In this research, we proposed a modified CLIQUES key management protocol. It was the modification of CLIQUES that consisted of two stages: Static CLIQUES and Hierarchical CLIQUES. In Static CLIQUES, a static group controller was used to distribute the partial keys to group members. Compared with traditional CLIQUES, the Static CLIQUES was more secure for key storage, less complex, less processing requirement in the user machine, and easier to provide member privacy protection. In Hierarchical CLIQUES, a hierarchical structure was employed to support larger size of group members. Our experiments showed that the modified CLIQUES protocol was more scalable than CLIQUES. Also, it required less processing power than the Key Tree-Based approaches.

Introduction

As a result of increasing multicast applications, data confidentiality becomes a challenging problem in secured multicast. In order to achieve data confidentiality, a shared secret key, refer to a group key, must be distributed to every member in the group. Since members may join or leave frequently, the group key must also be changed frequently to achieve forward and backward secrecy. Consequently, Key management mechanism is required to manage group key renewal and storage. A practical and scalable key management requires high security features, efficient key distribution, low key storage cost, and small processing overhead. Several key management mechanisms have been proposed in the literature. CLIQUES (Steiner et al., 2000, Just and Vaudenay, 1996, Burmester and Desmedt, 1995, Ateniese et al., 2000, Chan and Chan, 2003) is a scheme that uses the contributory key agreement approach. It extends the two-party DH algorithm (Diffie and Hellman, 1976) to allow a group of members to “agree” upon a symmetric group key thus imposes less decryption overhead in the user machine. CLIQUES has lower cost in establishing control manager. The main drawback of CLIQUES is that a large number of re-key messages have to be exchanged among members when there is a membership change. The number of messages exchanged is proportional to the size of the membership. Consequently, CLIQUES is not very scalable. In Key Tree-Based Approach (Wallner et al., 1999, Wong et al., 2000, Canetti et al., 1999, Chang et al., 1999, Balenson et al., 1999), a tree is used to divide members into subgroups so as to reduce the number of re-key messages, thus, support a large group of members. However, since it only supports asymmetric group key, higher processing power is required in the user machine. Secure Multicast Framework (Mittra, 1997, Hardjono et al., 1998, Hardjono et al., 1999, Waldvogel et al., 1999) is another key management system for multicast. It is good for wide-area multicast group because it breaks the group into smaller subgroups. However, it introduces packet delay. It is not working very well in real-time multicast systems, especially when the group is very large.

In this paper, we propose a scalable key management mechanism M-CLIQUES, which is also relatively simpler to implement. The proposed scheme is a modification of CLIQUES that consists of two stages. In stage 1, Static CLIQUES is introduced, in which a static group controller (GC) is used to distribute partial keys. In stage 2, we propose Hierarchical CLIQUES, which employs a hierarchical structure, to make the key management mechanism more scalable.

The rest of the paper is organized as follows. Sections 2 Static CLIQUES, 3 Hierarchical CLIQUES describe Static CLIQUES and Hierarchical CLIQUES, respectively. In Section 4, we lay out several security considerations of the mechanism. Section 5 compares the proposed schemes with CLIQUES and the Key Tree-Based approach. Section 6 concludes the paper.

Section snippets

Static group controller

CLIQUES relies on GC to distribute partial keys to the members. In current implementation, GC is dynamically assigned (Chan and Gray Chan, 2002). Essentially, the last-joined member becomes the GC. If the current GC leaves the group, another member will take over the GC's role. CLIQUES assumes that the underlying communication system provides a timely and consistent membership view to all group members, which is refer to as membership view synchrony.

In this paper, we introduce a static group

Hierarchical CLIQUES

Since CLIQUES cannot support a large group of members, we propose a Hierarchical CLIQUES algorithm that groups members into a hierarchical key tree. The number of messages and times of key re-calculation in Hierarchical CLIQUES is comparable to the Key Tree-Based Approach.

Security considerations

We considered several security issues related to our proposed mechanism.

  • (1)

    All partial keys are transmitted over the network without encryption. It is quite easy for a sniffer to collect partial keys and try to figure out the subgroup key. There are two assumptions of multi-party DH: the Group Decisional DH assumption (G-DDH) (Wallner et al., 1999) and Group Computational DH assumption (G-CDH) (Bresson et al., 2002). The G-DDH problem has been proved that if the two-party DDH problem is hard, the

Comparison

Comparisons of Key Tree-Based approach, CLIQUES, Static CLIQUES, and Hierarchical CLIQUES have been done on the number of keys stored in the server and members, re-key messages for join and leave, re-key processing for join and leave, and the cost of implementation. The comparisons are summarized in Table 1. We can see that for CLIQUES, the number of keys stored in the controller and the size of re-key messages are the highest among all compared schemes. Thus, the larger memory and higher

Conclusion

M-CLIQUES, a Modified CLIQUES key agreement algorithm is proposed to create a scalable and efficient multicast key management scheme. M-CLIQUES includes two stages: Static CLIQUES and Hierarchical CLIQUES. Static CLIQUES introduces a static group controller to store and distribute the partial keys when a membership change occurs. Hierarchical CLIQUES splits the members into subgroups and “recursively” splits each subgroup to form multi-level subgroups. Members in each subgroup “agree” on a

Xiaoyan Chen received the M.A.Sc degree in Computer Networks from Ryerson University, Toronto, Canada in 2006 and the B.Sc degree in Electronics and Information System from Sun Yet-Sen University, China, in 1996. She is currently a senior network analyst with Legal Aid Ontario, Canada. Her research interests include multicast security, vpn, ids/ips and load-balancing.

References (20)

  • Y. Amir et al.

    Secure group communication using robust contributory key agreement

    IEEE Transaction on Parallel and Distributed Systems

    (May 2004)
  • G. Ateniese et al.

    New multi-party authentication services and key agreement protocols

    IEEE Journal of Selected Areas in Communication

    (April 2000)
  • D. Balenson et al.

    Key establishment in large dynamic groups using one-way function trees and amortized initialization

    Internet Draft

    (1999)
  • Bresson E, Chevassut O, Pointcheval D. Group Diffie–Hellman key exchange secure against dictionary attacks. In:...
  • M. Burmester et al.

    A secure and efficient conference key distribution system

  • Canetti R, Garay J, Itkis G, Micciancio D, Naor M, Pinkas B. Multicast security: a taxonomy and some efficient...
  • K.C. Chan et al.

    Key management approaches to offer data confidentiality for secure multicast

    IEEE Network

    (September–October 2003)
  • K.-C. Chan et al.

    Distributed servers approach for large-scale secure multicast

    IEEE Journal on Selected Areas in Communications

    (October 2002)
  • Chang I, Engel R, Kandlur D, Pendarakis D, Saha D. Key management for secure internet multicast using Boolean function...
  • W. Diffie et al.

    New directions in cryptography

    IEEE Transaction on Information Theory

    (November 1976)
There are more references available in the full text version of this article.

Cited by (11)

  • Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges

    2015, Journal of Network and Computer Applications
    Citation Excerpt :

    For example, TGDH (Kim et al., 2004) is a well-known scheme in this category where the secret key of each parent node in the tree is derived from the secret key of one of its two children and the blind key of the other child by using the DH key exchange protocol. Several schemes in this category have been presented in Amir et al. (2005), Chen et al. (2007), Zheng et al. (2007), Magliveras et al. (2008), Konstantinou (2011), and Lv et al. (2012). The amount of interaction between members of a group to compute the TEK is either independent of the number of members or minimized as low as log2 n. Nevertheless, the group members must be synchronized to iteratively compute parental keys from their two children׳s keys, because any delay causes interruption in the key agreement.

  • Key management paradigm for mobile secure group communications: Issues, solutions, and challenges

    2015, Computer Communications
    Citation Excerpt :

    In TGDH [44] as a renowned scheme in this category, the secret key of each parent node in the tree is derived from the secret key of one of its two children and the blind key of the other child by using the DH key exchange protocol. Several schemes in this category have been presented in [45–50]. The amount of interaction among members of a group for computing the TEK is either independent from the number of members or minimized as low as log2n.

  • Hierarchical based group key transfer for secure group communication

    2016, International Arab Journal of Information Technology
  • Improved group key agreement for emergency cognitive radio mobile ad hoc networks

    2015, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
View all citing articles on Scopus

Xiaoyan Chen received the M.A.Sc degree in Computer Networks from Ryerson University, Toronto, Canada in 2006 and the B.Sc degree in Electronics and Information System from Sun Yet-Sen University, China, in 1996. She is currently a senior network analyst with Legal Aid Ontario, Canada. Her research interests include multicast security, vpn, ids/ips and load-balancing.

Bobby N.W. Ma received the B.A.Sc., M.A.Sc., and Ph.D. degrees in electrical engineering from the University of Waterloo, Ont., Canada in 1982, 1984, and 1988, respectively. In September 1988 he joined the department of Electrical and Computer Engineering, Ryerson University, Toronto, Ont., Canada, where he is currently a professor and the director of the Computer Networks Master of Engineering program. His current research interests are in the areas of Quality of Service, network security, and wireless networks.

Cungang Yang received the M.S degree in computer science from Jilin University, China. He completed his Ph.D degree in computer science in 2003 at University of Regina, Canada. In 2003, he joined the Ryerson University as an assistant professor in the Department of Electrical and Computer Engineering. His research areas include security of wireless sensor networks, role-based access control modeling, information flow control, web security and multimedia security.

View full text