Slide 1 Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Communication C. Zhang*, B. DeCleene +, J. Kurose*, D. Towsley* * Dept. Computer.

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

MMOM: Efficient Mobile Multicast Support Based on the Mobility of Mobile Hosts YUNGOO HUH and CHEEHA KIM Presented by Kiran Kumar Bankupally.
A Survey of Key Management for Secure Group Communications Celia Li.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Load Balancing of Elastic Traffic in Heterogeneous Wireless Networks Abdulfetah Khalid, Samuli Aalto and Pasi Lassila
KAIS T Scalable Key Management for Secure Multicast Communication in the Mobile Environment Jiannong Cao, Lin Liao, Guojun Wang Pervasive and Mobile Computing.
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Towards Scalable and Reliable Secure Multicast Presenter: Yang Richard Yang Network Research Lab Department of Computer Sciences The University of Texas.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
1 IMPROVING RESPONSIVENESS BY LOCALITY IN DISTRIBUTED VIRTUAL ENVIRONMENTS Luca Genovali, Laura Ricci, Fabrizio Baiardi Lucca Institute for Advanced Studies.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Group Key Distribution Chih-Hao Huang
Queuing Networks: Burke’s Theorem, Kleinrock’s Approximation, and Jackson’s Theorem Wade Trappe.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Enhanced power efficient sleep mode operation for IEEE e based WiMAX Shengqing Zhu, and Tianlei Wang IEEE Mobile WiMAX Symposium, 2007 IEEE Mobile.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages Liang Ma*, Ting He +, Ananthram Swami §, Kang-won Lee + and Kin K. Leung*
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Secure Group Communication: Key Management by Robert Chirwa.
MIT Fun queues for MIT The importance of queues When do queues appear? –Systems in which some serving entities provide some service in a shared.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Flows and Networks Plan for today (lecture 6): Last time / Questions? Kelly / Whittle network Optimal design of a Kelly / Whittle network: optimisation.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Group Key Distribution Xiuzhen Cheng The George Washington University.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
CS 3471 CS 347: Parallel and Distributed Data Management Notes13: Time and Clocks.
CS 347Notes 121 CS 347: Parallel and Distributed Data Management Notes12: Time and Clocks Hector Garcia-Molina.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Scheduling MPI Workflow Applications on Computing Grids Juemin Zhang, Waleed Meleis, and David Kaeli Electrical and Computer Engineering Department, Northeastern.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
A Study of Group-Tree Matching in Large Scale Group Communications
5.2 FLAT NAMING.
Strayer University at Arlington, VA
Presentation transcript:

slide 1 Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Communication C. Zhang*, B. DeCleene +, J. Kurose*, D. Towsley* * Dept. Computer Science University of Massachusetts/Amherst Amherst MA USA + ALPHATECH Burlington MA USA Performance 2002 in Rome

slide 2 Overview  introduction: hierarchical key management in a mobile environment  four key management algorithms  performance models  results  summary

slide 3 Scenario:  many mobile nodes requiring encrypted communication  symmetric data key used for encryption  rekey when member joins domain (backward confidentiality)  rekey when member leaves domain (forward confidentiality) Scalable, Secure Group Management Q: How to perform scalable rekeying given mobility? DKD … … AKD 1AKD 3 AKD 7AKD 8

slide 4 AKD 1AKD 3 AKD 7AKD 8 Efficient, scalable, secure group management  Hierarchical key distribution: domain divided into areas  area key distributor (AKD) distributes data key within area  per-area key to encrypt rekeying within area  exploit multicast communication within area DKD … … transfer leave join  Q: key management given mobility in/out/among areas

slide 5 Overview  introduction: hierarchical key distribution in a mobile environment  four key management algorithms  performance models  results  summary and future work

slide 6 SR: Static Rekeying  inter-AS communication during rekeying: inter-AS multicast AKD Static (SR)  node always belongs to same area move data key AS 1 AS 2  performance degradation: multiple data keys sent to an AS ( …)

slide 7 BR: Baseline Rekeying Baseline Rekeying (BR)  AS = area  move between ASs = transition between areas AKD join transfer leave data key AS 2 AS 1  inter-area-transfer implemented as domain leave/join  domain leave: area key rekey, data key rekey  domain join : area key rekey, data key rekey

slide 8 IR: Immediate Rekeying Immediate Rekeying (IR)  no data key rekeying during transition  area keys ( ) are rekeyed  credentials passed between AKDs to implement transfer of security relationship AKD data key AS 2 AS 1 join transfer leave

slide 9 FEDRP: First Entry Delayed Rekey (Periodic) First Entry Delayed Rekey (FEDRP)  area key rekeyed only on first entry to area and domain leave holding the area key AKD data key AS 2 AS 1 transfer  periodic rekey (optional): bound outside member area key holding time  no area key rekey for visit other than 1 st time  no area key rekeying when transferring out  mobile holds area keys while moving within domain

slide 10 Overview  introduction: hierarchical key distribution in a mobile environment  four key management algorithms  performance models  results  summary and future work

slide 11 Analysis Overview Performance metrics:  communication:  key-related msg rate within AS i  key-related msg rate out of AS i  computation: area key rekey rate  security: #(area keys) held by area member Modeling approach:  M areas  Poisson arrivals ( ) of new members to domain  exponential sojourn time within AS  inter-AS member mobility: Markov process

slide 12 Analysis Details  model each AS as M/M/ ∞ queue  1/  i (i  {1,…,M}) : average sojourn time in AS i per visit  state i (i  {1,…,M}) : inside domain, in AS i state M+1: outside domain  P = [p i,j ] (i,j  {1,…,M+1}) : state transition probability   = [  i ] (i  {1,…,M}) : area key periodic rekey interval (FEDRP)  compute occupancy probabilities for AS i  achieve performance metric of interest

slide 13 Analysis Summary:  SR, BR, IR  closed form solutions  FEDRP  further assumptions needed: (domain leave and period rekey) area rekeying is Poisson  solved as a fixed point problem  validated by DaSSF simulator

slide 14 Overview  introduction: hierarchical key distribution in a mobile environment  four key management algorithms  performance models  results  summary

slide 15 Message Rate within an AS FEDRP(1/δ=0): smallest msg rate, except with high mobility M=16, =100, 1/  = 1, HOMOGEMEOUS 10m 100m 1km Foot Urban HWY FootUrban HWY Foot Urban

slide 16 Message Rate out of an AS SR: higher inter-AS communication

slide 17 Area Key Rekey Rate FEDRP: rekey rate bounded by 2 +1/  i 1200=2* =2* =2*100+0

slide 18 Average #Area Keys held by a member FEDRP: # area keys held small except with high mobility

slide 19 same trend as homogeneous case small difference among areas Heterogeneous Case : 2D Random Walk  thus far: “transporter” mobility model - member can move directly from any AS to any other AS  2D random walk: only move to neighboring AS IR FEDRP AB BC BA CB BC AB CB BA

slide 20 Summary performance analysis of four inter-area rekey algorithms addressing the mobility issue  analytic performance models  modeling heterogeneous mobility such as “2D random walk”  FEDRP has lowest communication costs, and low computation costs  FEDRP allows to hold small number of area keys  SR performs better in highly mobile scenarios  cost: higher inter-AS communication

slide 21 Thanks

slide 22 Applications  large scale military  law enforcement  disaster recovery  business

slide 23 Future Work  data throughput  impact of loss and latency  authentication overhead  effect of LKH

slide 24 Thanks