The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Hierarchical Based Group Key Transfer for Secure

#
In  this  research  paper,  a  scalable  and  efficient  mu lticast  secure  protocol  for  large  and  dynamic  syste ms  that  relies  on  trusted  Key  Generation  Center  (KGC)  is  proposed.   In  this  protocol,  we  partition  the  entire  group  into  several  subgroups  which is controlled by Intermediate Controller  (IC) . Our protocol is based on Iolus protocol and the hierarchical structure of  LKH protocol. The decomposition of subgroup is orga nized in an hierarchical manner as it is in the LKH protocol which helps  us  to  reduce  the  complexity  for  a  member  to  join  or   leave  from  O(n)  to  O(log  m),  where  n  represents  th e  number  of  entire  group  members  and  m  represents  the  number of  each  s ubgroup  members.  Out  protocol performance  is  compar ed  with  that of  Iolus and LKH protocol. The performance is enhanced  especially when there is a member leave operation. 


[1] Ahamad M., Multicast Communication in Distributed Systems, IEEE Computer Society Press Technology Series , pp. 43555, 1990.

[2] Aslan H., A Scalable and Distributed Multicast Security Protocol Using a Subgroup5Key Hierarchy, Elsevier Computers and Security , vol. 23, pp. 3205329, 2004.

[3] Bonmariage N. and Leduc G., A Survey of Optimal Network Congestion Control for Unicast and Multicast, International Journal of Network Security , vol. 12, no. 2, pp. 61574, 2011.

[4] Cao J., Liao L. and Wang G., Scalable Key Management For Secure Multicast Communication In The Mobile Environment, Pervasive and Mobile Computing , vol. 2, no. 2, pp. 1875203, 2006.

[5] Challal Y. and Seba H., Group Key Management Protocols: A Novel Taxonomy, International Journal of Information Technology , vol. 2, no. 1, pp. 1055118, 2005.

[6] Chan K. and Chan S., Key Management Approaches to Offer Data Confidentiality For Secure Multicast, IEEE Network, vol. 17, no. 5, pp. 30539, 2003.

[7] Chen X., MA B. and Yang C., M5CLIQUES: Modified CLIQUES Key Agreement for Secure Multicast, Elsevier Computers and Security , vol. 26, pp.2385245, 2007.

[8] Chua T. and Pheanis D., Bandwidth Conserving Multicast VOIP Teleconference System, International Journal of Network Security , vol. 7, no. 1, pp. 42548, 2008.

[9] Gharout S., Yacine C., and Bouabdallah A., Scalable Delay5Constrained Multicast Group Key Management, International Journal of Network Security , Vol. 7, No.2, pp. 1605174, Sep.2008.

[10] Harte L., Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution, Althos Publishing , 2008.

[11] Jun Z., Yu Z., Fanyuan Ma., Dawu Gu., and Yingcai B, An Extension Of Secure Group Communication Using Key Graph, Elsevier Information Sciences , vol. 176, pp. 306053078, 2006.

[12] Kanyamee K. and Sathitwiriyawong C., High5 availability decentralized cryptographic multi5 agent key recovery, International Arab Journal of Information Technology , vol. 11, no. 1, pp. 525 58, 2014.

[13] KeiWong C., Gouda M., and Lam S., Secure Group Communications Using Key Graphs, IEEE/ACM Transactions On Networking , vol. 28, no. 4, pp. 16530, 2000.

[14] Kim Y., Perrig A., and Tsudik G., Communication Efficient Group Key Hierarchical Based Group Key Transfer for Secure Group Communication 573 Agreement, IFIP SEC'01 Conference , pp. 2295 244, France, 2001.

[15] Mittra S., Iolus: A Framework For Scalable Secure Multicasting, ACM SIGCOMM Computer Communication Review , vol. 27, no. 4, pp. 2775288, 1997.

[16] Ng W., Howarth. M., Sun Z. and Cruickshank H., Dynamic Balanced Key Tree Management for Secure Multicast Communications, IEEE Transactions on Computers, vol. 56, no. 5, pp. 5905605, 2007.

[17] Paul S., Multicasting on the Internet and Its Applications, Springer-Verlag , 1998.

[18] Peterson L. and Davie B., Computer Networks: A Systems Approach , Morgan Kaufmann Publishers Inc., Fourth Edition, 2007.

[19] Peyravian M., Matyas S., and Zunic N., Decentralized Group Key Management For Secure Multicast Communications, Computer Communications , vol. 22, pp. 118351187, 1999.

[20] Pour A., Kumekawa K., Kato T. and Itoh S., A Hierarchical Group Key Management Scheme for Secure Multicast Increasing Efficiency of Key Distribution in Leave Operation, Computer Networks , vol. 51, pp. 472754743, 2007.

[21] Rafaeli S. and Hutchinson D., A Survey of Key Management for Secure Group Communication, ACM Computing Surveys, vol. 35, no. 3, pp. 3095 329, 2003.

[22] Rafaeli S. and Hutchinson D., Hydra: A Decentralized Group Key Management, Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop , pp. 625 67, June 2002.

[23] Setia S., Zhu S., and Jajodia S., A Scalable and Reliable Key Distribution Protocol For Multicast Group Rekeying, Technical report, George Mason University , 2002.

[24] Srinivasan R., Vaidehi V., Rajaraman R., and Kanagaraj S., Secure Group Key Management Scheme For Multicast Networks, International Journal of Network Security , vol. 11, no. 1, pp. 33538, 2010.

[25] Steiner M., Tsudik G., and Waidner M., Key Agreement In Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 7695780, 2000.

[26] Wallner D., Harder E., and Agee R., Key Management for Multicast: Issues and Architectures, National Security Agency , RFC 2627, 1999.

[27] Wittmann R. and Zitterbart M., Multicast Communication Protocols, Programming and Applications , Morgan Kaufmann Publishers Inc., 2000. Kanimozhi Sakthivel received ME degree in Computer Science and Engineering from Anna University of Technology, Coimbatore. Currently she is pursuing PhD in IST department from Anna University, Chennai.. Velumadhava Rao Rajasekaran received the BE degree in Computer Science and Engineering from C.I.E.T, Coimbatore and ME degree in Software Engineering from Anna University, Chennai, India. He is currently working as an Assistant Professor in Rajalakshmi Institute of Technology, Chennai. He is also pursuing his Part Time Ph.D in Computer Science and Engineering from Anna University, Chennai. Selvamani Kadirvelu received B.E degree in Electrical and Electronics Engineering from Annamalai University and M.E degree in Computer Science and Engineering from Bharathiyar University and Ph.D degree in Information and Communication Engineering from Anna University. He is currently working as Assistant Professor in College of Engineering, Guindy, Anna University, Chennai. Kannan Arputharaj received the M.E degree Computer Science and Engineering from Anna University and Ph.D degree in Information and Communication Engineering from Anna University. He is currently working as Professor in IST, College of Engineering, Guindy, Anna University, Chennai.