skip to main content
10.1145/3328886.3328895acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmbConference Proceedingsconference-collections
research-article

Lightweight Membership Management Scheme for Lightweight Group Communication Platforms

Published: 24 March 2019 Publication History

Abstract

A scheme for reducing the overhead of member changes in secure multicasting environments is proposed. The scheme requires transmission of only the identifications of participants to be revoked. For environments where storage overhead is an issue, serial revocation is recommended. However, when the issue is bandwidth rather than storage, then parallel revocation will prevail. Either way, the revocation process is blindly carried by all participants collaboratively, including the target. The communication overhead is less than that of the leading surveyed scheme. The scheme can be implemented using either hardware or software.

References

[1]
S. Berkovits, "How to broadcast a secret, Advances in cryptology" - Eurocrypt'91, Lecture Notes in Computer Science 547, pp. 536--541, 1991.
[2]
C.K. Wong, M.G. Gouda, and S.S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16--30, Feb. 2000.
[3]
S.S. Kulkarni and B. Bruhadeshwar, "Adaptive rekeying for secure multicast," IEEE/IEICE Trans. Comm., special issue on comm., vol. E86-B, no. 10, pp. 2948--2956, Oct. 2003.
[4]
D. McGrew and A. Sherman, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444--458, May 2003.
[5]
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for secure Internet multicast using boolean function minimization techniques," Proc. IEEE INFOCOMM '99, vol. 2, pp. 689--698, Mar. 1999.
[6]
X.S. Li, Y.R. Yang, M. Gouda, and S.S. Lam, "Batch updates of key n trees," Proc. 10th Int'l World Wide Web Conf. (WWW10), May 2001.
[7]
S. Setia, S. Koushish, and S. Jajodia, "Kronos: a scalable group re-keying approach for secure multicast," Proc. IEEE Symp. Security and Privacy, pp. 215--228, 2000.
[8]
W.H.D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, "Dynamic balanced key tree management for secure multicast communications," IEEE Trans. Computers, vol. 56, no. 5, pp. 577--589, May 2007.
[9]
F. Zhu, A. Chan, and G. Noubir, "Optimal tree structure for key management of simultaneous join/leave in secure multicast," Proc. Military Comm. Conf. (MILCOM), 2003.
[10]
M.H. Heydari, L. Morales, and I.H. Sudborough, "Efficient algorithms for batch re-keying operations in secure multicast," Proc. 39th Ann. Hawaii Int'l Conf. System Sciences, vol. 9, 2006.
[11]
D.M. Wallner, E.J. Harder, and R.C. Agee, "Key management for multicast: issues and architectures," RFC 2627, 1999.
[12]
A. Fiat. and Naor M., "Broadcast Encryption, Advances in cryptology" - Crypto'93, Lecture Notes in Computer Science 773, pp. 480--491, 1993.
[13]
M. Naor. and B.Pinkas, "Efficient trace and revoke schemes", Financial Cryptography'00, Lecture Notes in Computer Science 1962, pp. 1--20, 2000.
[14]
D. Naor D., M. Naor., and J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Electronic Colloquium on Computational Complexity (ECCC), Report No. 43, 2002.
[15]
D. Halevi and A. Shamir, "The LSD Broadcast Encryption Scheme", Advances in Cryptology - Crypto'02, Lecture Notes in Computer Science 2442, pp. 47--60, 2002.
[16]
E. S.Yoo, N. S. Jho, J. H. Cheon., and M. H. Kim, "Efficient broadcast encryption using Multiple Interpolation Methods", Proceedings of ICISC'04, Lecture Notes in Computer Science 3506, pp. 87--104, 2005.
[17]
H. Cheon., N.S Jho,. M. H. Kim, and E. S. Yoo, "Skipping, cascade, and combined chain schemes for broadcast encryption", IEEE Transactions on Information Theory, January 2008, pp. 1--18, 2008.
[18]
Bruschi and E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issues," Mobile Networks and Applications, vol. 7, no. 6, pp. 503--511, 2002.
[19]
S. Zhu, S. Setia, S. Xu, and S. Jajodia, "Gkmpan: an efficient group rekeying scheme for secure multicast in ad-hoc networks," Proc. IEEE Mobiquitos '04, pp. 42--51, 2004.
[20]
Y. Sun, W. Trappe, and K.J.R. Liu, "A Scalable multicast key Management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 653--666, Aug. 2004.
[21]
B. Bruhadeshwar., S. Kulkarni., "Balancing revocation and storage trade-offs in secure group communication", IEEE Transaction on Dependable and Secure Computing, January-February 2011, pp. 58--73, 2011.
[22]
E. Abuelyaman., "A lookup tree based security for one-to-many communication" Proceedings of the International Conference on Information Science, Electronics, and Electrical Engineering, Sapporo, Japan. 26-28 April 2014. Volume 1, PP unavailable, Paper-link December, 2014.
[23]
V. Kumar. R. Kumar, Pandey S.K. "A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem" Journal of King Saud University - Computer and Information Sciences, January 2018.

Index Terms

  1. Lightweight Membership Management Scheme for Lightweight Group Communication Platforms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCMB '19: Proceedings of the 2019 2nd International Conference on Computers in Management and Business
    March 2019
    92 pages
    ISBN:9781450361682
    DOI:10.1145/3328886
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Univ. of Manchester: University of Manchester

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 March 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Communication
    2. Encryption
    3. Overhead
    4. Revocation
    5. Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCMB 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 36
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media