Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.

Slides:



Advertisements
Similar presentations
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
Self-Healing in Wireless Networks. The self-healing property is expected in many aspects in wireless networks: – Encryption algorithms – Key distribution.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec Presented by Seo Bon Keun, 2008.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1.1 Distributed and Collaborative Key Agreement Protocols with Authentication and Implementation for Dynamic Peer Groups Patrick Pak-Ching LEE.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Towards Scalable and Reliable Secure Multicast Presenter: Yang Richard Yang Network Research Lab Department of Computer Sciences The University of Texas.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Overview Distributed vs. decentralized Why distributed databases
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Wide-area cooperative storage with CFS
Group Key Distribution Chih-Hao Huang
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Secure Group Communication: Key Management by Robert Chirwa.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANS April. 27 th, 2005 Presented by, Kang Eui Lee.
1 Distributed and Collaborative Key Agreement Protocols with Authentication and Implementation for Dynamic Peer Groups Patrick P. C. Lee.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
1 Distributed Databases BUAD/American University Distributed Databases.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika.
Group Key Distribution Xiuzhen Cheng The George Washington University.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Key Management Network Systems Security Mort Anvari.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Fall 2006CS 395: Computer Security1 Key Management.
KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’ Kim Pyung.
Fault Tolerance (2). Topics r Reliable Group Communication.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSC 774 Advanced Network Security
Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Membership Andrew Moore 9/27/2011.
EEC 688/788 Secure and Dependable Computing
Distributed security – Dynamic Group Key Management by Jaman Bhola
Combinatorial Optimization of Multicast Key Management
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Key Management Protocols
Presentation transcript:

Secure Multicast (II) Xun Kang

Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and Wireless Network

Batch Updates of Key Trees Any problem in previous solution? –Synchronization problems among rekey msgs and between rekey and data msgs; How? –Individual rekeying can be inefficient; especially when join/leave happens frequently, there will be a huge burden on server for signing keys;

Periodic Batch Rekeying Rekey subtree; Collect requests during a rekey interval and rekey them in a batch; Advantage: –For a J join and L leave, only needs 1 signing; –Less number of encrypted keys; Disadvantage: –Delayed group access control; A balance between rekeying overhead and group access control, the degree of forward access control vulnerability.

Three Ways of Batch Rekeying Periodic batch rekeying; Periodic bath leave rekeying; Periodic bath join rekeying; Question: –What’s the advantage and disadvantage of each one? Which one is better?

Batch Rekeying Algorithm (1) Strategy 1: always keep a balanced tree Adv: reduce the encrypted key number Dis: key server needs to provide new IDs to new join users as well as existing users?

Batch Rekeying Algorithm (2) Strategy 2 –New nodes form a subtree –Grafted to a departed node with smallest height? Advantage –only one existing node needs to modify ID Disadvantage –Balance problem

Batch Rekeying Algorithm (3) Strategy 3 –K 789 ’s null children will be first replaced with new users –If still new users, let user nodes at next level be split –If still new users after that, use next user nodes “next” means sequential number, for example root is 0, then at tree level 1, the three key nodes will be 1, 2, 3 What is the advantage? ID automatically discovered.

Reliable rekey protocol Eventual reliability –A receiver should receive all needed keys; Soft real-time requirement –A rekey msg is finished before the start of the next rekey interval Solution –Send re-synchronization requests when cannot recover a rekey msg in time; –Proactive FEC for reducing recovery latency;

Proactive FEC Partition rekey msgs into blocks Generate  ( p-1 )k  PARITY packets (FEC) for each block

Contributory GKM Application environment –Many to many applications Tele conferencing Application supporting collaborative work –Small size group –Group Splitting problem Centralized GKM has some problems –Key generator (TTP) must be always available –TTP must exist in every possible subset of a group Contributory GKM

Tree-based Group Diffie-Hellman TGDH –Key trees to efficiently compute and update group keys; –Diffie-Hellman key exchange to achieve provably secure and fully distributed protocols; A problem? What’s difference, effect? –EVS: extended virtual synchrony –VS: view synchrony

Cryptographic Properties For the security requirement of group key –Suppose a successive group key changes form K 0 to K m Group key secrecy Forward secrecy Backward secrecy Key independence –More strong than typical ones, for example New member can not know past keys New keys must keep secret from leaved guys

Some Definitions for TGDH M i : i-th group members : v-th node at level l in a tree T i : M i ’s view of the key tree T : a subtree rooted at node K i : node M i ’s individual key BK i * : set of M i ’s blinded keys –BK = f(K ) –ie. f(k) = a k mod p --- p is a large prime number

A TDGH Key Tree Example * Calculate the group key * Replicated on each node * Only BK are transmitted

TGDH Membership Events Join –a new member is added to the group Leave – a member is removed from the group Merge –a group is merged with the current group Partition –a subset of members are split from the group Key refresh –the group key is updated

TGDH - Join Protocol How to choose the insert point? o Full balanced or not How to choose sponsor? o A guy for computing new intermediate keys and broadcasting to the group

Join Protocol

TGDH - Leave Protocol

TGDH - Partition Protocol

TGDH - Merge Protocol

Multiple Subgroups Merging First, the trees are ordered by height in decreasing order; if same height, list them in lexicographic order of the first member in each tree Let T 1 the original tree T For i = 2 to k, merge_trees(T, T i )

Cascaded Events All membership events are delivered in sequence after all outstanding messages are delivered ---- underlying group communication system.

Self-clustering

Performance Please refer to the paper

Recent Progress of SM Classification of KM for wired networks Some hard problems A wireless network multicast security example Open issues in this area

Classification of KM Schemes

Some Hard Parts Synchronization Balanced key tree maintaining Watermarking –copyright protection problem If we assume that no one will deliver illegal copy to unauthorized users, is there any difference between these two? –Using individual secret key –Using shared group key to protect content

SM in Wireless Network DKD generates DEK DEK is protected by KEK Rekeying algorithms: 1.Baseline rekeying 2.Immediate rekeying 3.Delayed rekeying

Open Issues Leave for your guys!