DOI QR코드

DOI QR Code

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P. (Department of Computer Science and Engineering, University College of Engineering Tindivanam) ;
  • Bose, S. (Department of Computer Science and Engineering, Anna University Chennai) ;
  • Kannan, A. (Department of Information Science and Technology, Anna University Chennai) ;
  • Jegatha Deborah, L. (Department of Computer Science and Engineering, University College of Engineering Tindivanam)
  • Received : 2012.12.01
  • Accepted : 2013.03.21
  • Published : 2013.04.30

Abstract

Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

Keywords

References

  1. Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "A secure key distribution protocol for multicast communication," Balasubramaniam P. (eds.) Gandhigram-India, CCIS.,Vol.140, Springer, Heidelberg, 2011, pp. 249-257.
  2. Vijayakumar,P., Bose,S., Kannan,A., "Centralized Key Distribution Protocol using the Greatest Common Divisor Method," Computers & Mathematics with Applications, Elsevier, Article Online.
  3. Mingyan Li, Poovendran,R., David McGrew,A., "Minimizing center key storage in hybrid one-way function based group key management with communication constraints," Elsevier, Information Processing Letters, Vol.93, No.4, pp. 191-198, 2004.
  4. Patrick P.C Lee, John C. S Lui, David K.Y Yau, "Distributed collaborative key agreement protocols for dynamic peer groups," in Proc. of the IEEE International Conference on Network Protocols, pp. 322, 2002.
  5. Lihao Xu, Cheng Huang, "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19,No.5, pp. 1-10,2008. https://doi.org/10.1109/TPDS.2008.4396954
  6. Wade Trappe, Jie Song, Radha Poovendran, K. J Ray Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1449-1452, 2001.
  7. Lee,J.S., Son,J.H., Park, Y.H.,Seo,S.W., "Optimal level-homogeneous tree structure for logical key hierarchy," in Proc. of IEEE Conference on Communication System Software and Middleware Workshop (COMSWARE), 2008.
  8. Dong-Hyun Je, Jun-Sik Lee, Yongsuk Park, Seung-Woo Seo, "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Elsevier, Computer Communications, Vol.33, No.6, pp. 136-148, 2010. https://doi.org/10.1016/j.comcom.2009.08.007
  9. Wong, C., Gouda,M., and Lam,S., "Secure group communications using key graphs, IEEE/ACM Transactions on Networking," Vol. 8, No.1, pp.16-30, 2000. https://doi.org/10.1109/90.836475
  10. David,A., McGrew and Alan T. Sherman, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on software engineering, Vol.29,No.5, pp. 444-458, 2003. https://doi.org/10.1109/TSE.2003.1199073
  11. Poovendran,R., Baras,J.S., "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Transactions on Information Theory, Vol. 47, No.7, pp. 2824-2834, 2001. https://doi.org/10.1109/18.959263
  12. Wade Trappe, Jie Song, Radha Poovendran, Ray Liu K J, "Key management and distribution for secure multimedia multicast," IEEE Transactions on Multimedia,Vol.5,No.4, pp. 544-557, 2003. https://doi.org/10.1109/TMM.2003.1244817
  13. Xianjin Fang, Longshu Li, "On karatsuba multiplication algorithm," in Proc. of 7th Int. Data, Privacy, and E-Commerce Symp., Washington, DC, USA, pp. 274-276, 2007.
  14. Tom St Denis, "Bignum math implementing cryptographic multiple precision arithmetic," SYNGRESS Publishing, 2003.
  15. Meftah,S., Razali,R., Samsudin,A., Budiator,R., "Enhancing public-key cryptosystem using parallel karatsuba algorithm with socket programming," in Proc. of 9th Asia-Pacific Conference on Coomunication, Penang, Malaysia, September 21-24, pp. 706-710, 2003.
  16. Jebelean,T., "Using the parallel karatsuba algorithm for long integer multiplication and division," in Proc. of European Conference on Parallel Processing, in Lecture Notes in Computer Science, pp. 1169-1172, 1997.
  17. Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "An effective key distribution protocol for secure multicast communication," in Proc. of IEEE International Conference on Advanced Computing, Chennai, December 14-16, pp. 102-107, 2010.
  18. Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No.6, pp.689-705, 2010. https://doi.org/10.1016/j.comcom.2009.11.014
  19. Bezawada Bruhadeshwar, Kishore Kothapalli, "A family of collusion resistant symmetric key protocols for authentication," ICDCN, pp. 387-392, 2008.
  20. Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya, "Reducing the cost of session key establishment," ARES, pp. 369-373, 2009.
  21. Bezawada Bruhadeshwar, Kishore Kothapalli, Poornima,M., Divya,M., "Routing protocol security using symmetric key based techniques," ARES, pp. 193-200, 2009.
  22. MacWilliams,F.J., and Sloane,N.J.A., "The theory of error correcting codes," North-Holland Math. Library,1977.
  23. Adrian Perrig, Dawn Song, Tygar,J.D., "ELK: a new protocol for efficient large-group key distribution," in Proc. of IEEE Symposium on Security and Privacy Symposium, pp. 247-262, 2001.
  24. Harney,H., Harder,E., "Logical key hierarchy protocol," Internat Draft, IETF, Expired in August 1999.
  25. Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012.
  26. Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012.

Cited by

  1. Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels vol.8, pp.10, 2013, https://doi.org/10.3837/tiis.2014.10.016
  2. An efficient group key agreement protocol for secure P2P communication vol.9, pp.17, 2013, https://doi.org/10.1002/sec.1578
  3. An effective key distribution for secure internet pay‐TV using access key hierarchies vol.9, pp.18, 2016, https://doi.org/10.1002/sec.1680
  4. On the Exploration of Adaptive Mechanisms Providing Reliability in Clustered WSNs for Power Plant Monitoring vol.2016, pp.None, 2013, https://doi.org/10.1155/2016/4158735
  5. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks vol.20, pp.3, 2013, https://doi.org/10.1007/s10586-017-0848-x
  6. Managing key multicasting through orthogonal systems vol.20, pp.8, 2013, https://doi.org/10.1080/09720529.2016.1190563
  7. Provably secure attribute based signcryption with delegated computation and efficient key updating vol.11, pp.5, 2017, https://doi.org/10.3837/tiis.2017.05.019
  8. Self-Similar key generation for secure communication in multimedia applications vol.77, pp.8, 2013, https://doi.org/10.1007/s11042-018-5688-z
  9. Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication vol.2021, pp.None, 2013, https://doi.org/10.1155/2021/5599996