Abstract
Group key management is one of the key security issues in multicast networks. The main challenge is to provide a secure group key management method which avoids high key update cost in terms of the number of transmitted keys. In order to achieve low key update cost for group key management, most of the existing methods increase their encryption/decryption cycles which requires a strong cryptographic function. In this paper, a cost-effective key management method is proposed to address the problem of high key update cost without increasing the encryption/decryption cycles. We evaluated our proposed method with existing tree-based methods by using Markov chain and Poisson Arrival Process. Results indicate the efficiency of our proposed method in reducing the key update cost significantly compared to the existing tree-based key management methods.
Similar content being viewed by others
References
Wittmann, R., & Zitterbart, M. (2000). Multicast communication: Protocols and applications. Los Altos: Morgan Kaufmann.
Hardjono, T., & Dondeti, L. R. (2003). Multicast and group security. London: Artech House Publishers.
Naranjo, J., Antequera, N., Casado, L., & Lopez-Ramos, J. (2011) A suite of algorithms for key distribution and authentication in centralized secure multicast environments. Journal of Computational and Applied Mathematics, 236(12), 3042–3051.
Ragab Hassen, H., Bettahar, H., Bouadbdallah, A., & Challal, Y. (2012). An efficient key management scheme for content access control for linear hierarchies. Computer Networks, 56(8), 2107–2118.
Harney, H., & Harder, E. (1999). Logical key hierarchy protocol. Draft-harney-sparta-lkhp-sec-00.txt, IETF Internet Draft (work in progress).
Sherman, A., & McGrew, D. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5), 444–458.
Lin, J.-C., Huang, K.-H., Lai, F., & Lee, H.-C. (2009). Secure and efficient group key management with shared key derivation. Computer Standards & Interfaces, 31, 192–208.
Vijayakumar, P., Bose, S., & Kannan, A. (2012). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360–1368.
Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33, 136–148.
Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Kalimuthu, R., & Dharmaraj, R. (2010). Secure group key management scheme for multicast networks. International Journal of Network Security, 11, 30–34.
Mehdizadeh, A., Hashim, F., Abdullah, R. S. A. R., Ali, B. M., Othman, M., & Khatun, S. (2013). Multicast-unicast data delivery method in wireless IPv6 networks. Journal of Network and Systems Management. doi:10.1007/s10922-013-9268-2.
Mehdizadeh, A., Abdullah, R., Azmir, R. S., & Hashim, F. (2012). Secure group communication scheme in wireless IPv6 networks: An experimental test-bed. In International symposium on communications and information technologies (ISCIT) (pp. 724–729), Gold Coast, Australia.
Mehdizadeh, A., & Hashim, F. (2012). Modeling of efficient key management method in multicast networks. In 6th International conference on signal processing and communication systems (ICSPCS 2012), Gold Coast, Australia.
Wallner, D., Harder, E., & Agee, R. (1999). Key management for multicast: Issues and architectures. IETF, RFC 2627.
Bertsekas, D., & Gallager, R. (1992). Data networks. Englewood Cliffs: Prentice-Hall.
Ching, W. K., & Ng, M. K. (2006). Markov chains: Models, algorithms and applications (Vol. 83). New York: Springer.
Stewart, W. J. (2009). Probability, Markov chains, queues, and simulation: The mathematical basis of performance modeling. Princeton: Princeton University Press.
Gross, D. (2008). Fundamentals of queueing theory. India: Wiley.
Gau, R. H. (2006). Performance analysis of multicast key backbone for secure group communications. IEEE Communications Letters, 10, 555–557.
Yan, S., Trappe, W., & Liu, K. J. R. (2004). A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking, 12, 653–666.
Ross, S. M. (2009). Introduction to probability models. New York: Academic Press.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mehdizadeh, A., Hashim, F., Abdullah, R.S.A.R. et al. Performance Evaluation of Cost-Effective Multicast–Unicast Key Management Method. Wireless Pers Commun 77, 2195–2212 (2014). https://doi.org/10.1007/s11277-014-1633-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-1633-2