KAIS T Scalable Key Management for Secure Multicast Communication in the Mobile Environment Jiannong Cao, Lin Liao, Guojun Wang Pervasive and Mobile Computing.

Slides:



Advertisements
Similar presentations
Fast and Secure Universal Roaming Service for Mobile Internet Yeali S. Sun, Yu-Chun Pan, Meng-Chang Chen.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
Non-interactive key establishment in mobile ad hoc networks ► Li, Zhenjiang; Garcia-Luna-Aceves, J.J. ► Ad Hoc Networks Volume: 5, Issue: 7, September,
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec Presented by Seo Bon Keun, 2008.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Mutual authentication and group key agreement for low-power mobile devices Authors: Emmanuel Bresson, Olivier Chevassut, Abdeilah Essiari, David Pointcheval.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Group Key Distribution Chih-Hao Huang
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Slide 1 Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Communication C. Zhang*, B. DeCleene +, J. Kurose*, D. Towsley* * Dept. Computer.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Secure Group Communication: Key Management by Robert Chirwa.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Group Key Distribution Xiuzhen Cheng The George Washington University.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp , 作者: Yoh Shiraishi, Ryo Miki 指導教授:許子衡 教授.
KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’ Kim Pyung.
Md Tareq Adnan Centralized Approach : Server & Clients Slow content must traverse multiple backbones and long distances Unreliable.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Non-PKI Methods for Public Key Distribution
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Presentation transcript:

KAIS T Scalable Key Management for Secure Multicast Communication in the Mobile Environment Jiannong Cao, Lin Liao, Guojun Wang Pervasive and Mobile Computing 2 (2006) Kim Pyung

Scalable Key Management for Secure Multicast Communication Introduction IP Multicast Saves a great deal of bandwidth Needs group key management in a scalable and secure manner Scalability Under the mobile Internet environment Frequent moving, joining and leaving, and the large size of a group 1-affects-N phenomenon ( re-keying message, # of enc/decryption ) Security Backward / forward confidentiality 2/15

System Model and Assumptions Scalable and Hierarchical key management(SHKM) S : multicast source F: forwarding node, subgroup manager CA : Centralized authority Scalable Key Management for Secure Multicast Communication 3/15

SHKM : Main idea Hierarchy by subgroup priority ordering F i » F j Initiation : RSA algorithm Randomly chosen TEKs by SGM The parameters for derivation of the lower group’s TEK from CA changing residue e j, related factor г ij Scalable Key Management for Secure Multicast Communication 4/15

SHKM : Key Generation SGM S i chooses the TEK k i CA gets (PK, SK) by RSA PK : public key E PK (k i ) D SK (k i ) changing residue : e i = k i 2 mod n ( n is secret ) if S j » S i, related factor : г ji = h(Z k j  e i mod P)  k i Scalable Key Management for Secure Multicast Communication SiCA 5/15

SHKM : Key Derivation TEK : k j requestsfor access S i parameters : e i, г ji E k j ( e i, г ji ) check S j » S i ? D k j ( e i, г ji ) TEK of S i : k i = h(Z k j  e i mod P)  г ji Scalable Key Management for Secure Multicast Communication SjCA 6/15

SHKM : Key Modification the relationship : S j » S l » S i key modification : k l  k l * e l * = ( k l *) 2 mod n г jl * = h(Z k j  e l * mod P)  k l * г li * = h(Z k l *  e i mod P)  k i Only direct successor and predecessor of S l Scalable Key Management for Secure Multicast Communication 7/15

SHKM : Protocol analysis Adding a new subgroup A new subgroup S i into an existing multicast group the changing residue e i, related factor г (CA) No re-keying message and No re-generation of a new TEK for whole group  Scalable vs Key Graph ? Backward confidentiality? S h » S i (new) » S j » S k » S l Scalable Key Management for Secure Multicast Communication 8/15

SHKM : Protocol analysis Deletion of a subgroup For the higher-priority subgroups Delete the changing residue e, related factor г (CA) No re-key message For the lower-priority subgroups New TEK for lower-priority subgroups New changing residue e, related factor г (CA) vs Centralized protocols ? - the cost transferred to CA Scalable Key Management for Secure Multicast Communication 9/15

SHKM : Protocol analysis Leaving of subgroup members Multiple leaving about h, (m i, m i+1, …, m i+h-1 ) in S l New TEK k l * for S l  new changing residue e l (CA) For the higher-priority subgroups New related factor г (CA) For the lower-priority subgroups New TEK for lower-priority subgroups New changing residue e, related factor г (CA) Scalable Key Management for Secure Multicast Communication 10/15

SHKM : Protocol analysis Joining of a new subgroup member New TEK k l * for S l  new changing residue e l (CA) For the higher-priority subgroups New related factor г (CA) For the lower-priority subgroups  backward confidentiality New related factor г (CA) Scalable Key Management for Secure Multicast Communication 11/15

SHKM : Protocol analysis Migration of member between subgroups First entry delayed re-keying + periodic (FEDRP) A TEK timer table for members residing outside the subgroup Leaving or timer expire  “Reset” A lower re-keying rate Scalable Key Management for Secure Multicast Communication 12/15

Attack Analysis Continuous attack (in Lin’ scheme) k i is exposed S j » S i г ji = Z k j  ID i mod P  k i k i = Z k j  ID i mod P  г ji k i *= Z k j  ID i mod P  г ji *  k i *=h( Z kj  e i * mod P )  г ji * Sibling attack S j » S i and S j » S l h( Z kj  e i * mod P ) = г ji *  k i h( Z kj  e l * mod P ) = г jl *  k l Scalable Key Management for Secure Multicast Communication 13/15

Evaluation n : # of group userss : # of groups t : # of ave successorsm : # of ave dir-successors r : related factor computatione : changing residue computation Scalable Key Management for Secure Multicast Communication 14/15

Conclusions No re-keying messages, but some reporting messages Reduced enc/dec cost compared with decentralized  transferred to CA The defense of malicious attacks Scalable Key Management for Secure Multicast Communication 15/15