..............................
..............................
..............................
Hierarchical Based Group Key Transfer for Secure
In this research paper, a scalable and efficient mu lticast secure protocol for large and dynamic syste ms that relies
on trusted Key Generation Center (KGC) is proposed. In this protocol, we partition the entire group into several subgroups
which is controlled by Intermediate Controller (IC) . Our protocol is based on Iolus protocol and the hierarchical structure of
LKH protocol. The decomposition of subgroup is orga nized in an hierarchical manner as it is in the LKH protocol which helps
us to reduce the complexity for a member to join or leave from O(n) to O(log m), where n represents th e number of entire
group members and m represents the number of each s ubgroup members. Out protocol performance is compar ed with that of
Iolus and LKH protocol. The performance is enhanced especially when there is a member leave operation.
[1] Ahamad M., Multicast Communication in Distributed Systems, IEEE Computer Society Press Technology Series , pp. 43555, 1990.
[2] Aslan H., A Scalable and Distributed Multicast Security Protocol Using a Subgroup5Key Hierarchy, Elsevier Computers and Security , vol. 23, pp. 3205329, 2004.
[3] Bonmariage N. and Leduc G., A Survey of Optimal Network Congestion Control for Unicast and Multicast, International Journal of Network Security , vol. 12, no. 2, pp. 61574, 2011.
[4] Cao J., Liao L. and Wang G., Scalable Key Management For Secure Multicast Communication In The Mobile Environment, Pervasive and Mobile Computing , vol. 2, no. 2, pp. 1875203, 2006.
[5] Challal Y. and Seba H., Group Key Management Protocols: A Novel Taxonomy, International Journal of Information Technology , vol. 2, no. 1, pp. 1055118, 2005.
[6] Chan K. and Chan S., Key Management Approaches to Offer Data Confidentiality For Secure Multicast, IEEE Network, vol. 17, no. 5, pp. 30539, 2003.
[7] Chen X., MA B. and Yang C., M5CLIQUES: Modified CLIQUES Key Agreement for Secure Multicast, Elsevier Computers and Security , vol. 26, pp.2385245, 2007.
[8] Chua T. and Pheanis D., Bandwidth Conserving Multicast VOIP Teleconference System, International Journal of Network Security , vol. 7, no. 1, pp. 42548, 2008.
[9] Gharout S., Yacine C., and Bouabdallah A., Scalable Delay5Constrained Multicast Group Key Management, International Journal of Network Security , Vol. 7, No.2, pp. 1605174, Sep.2008.
[10] Harte L., Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution, Althos Publishing , 2008.
[11] Jun Z., Yu Z., Fanyuan Ma., Dawu Gu., and Yingcai B, An Extension Of Secure Group Communication Using Key Graph, Elsevier Information Sciences , vol. 176, pp. 306053078, 2006.
[12] Kanyamee K. and Sathitwiriyawong C., High5 availability decentralized cryptographic multi5 agent key recovery, International Arab Journal of Information Technology , vol. 11, no. 1, pp. 525 58, 2014.
[13] KeiWong C., Gouda M., and Lam S., Secure Group Communications Using Key Graphs, IEEE/ACM Transactions On Networking , vol. 28, no. 4, pp. 16530, 2000.
[14] Kim Y., Perrig A., and Tsudik G., Communication Efficient Group Key Hierarchical Based Group Key Transfer for Secure Group Communication 573 Agreement, IFIP SEC'01 Conference , pp. 2295 244, France, 2001.
[15] Mittra S., Iolus: A Framework For Scalable Secure Multicasting, ACM SIGCOMM Computer Communication Review , vol. 27, no. 4, pp. 2775288, 1997.
[16] Ng W., Howarth. M., Sun Z. and Cruickshank H., Dynamic Balanced Key Tree Management for Secure Multicast Communications, IEEE Transactions on Computers, vol. 56, no. 5, pp. 5905605, 2007.
[17] Paul S., Multicasting on the Internet and Its Applications, Springer-Verlag , 1998.
[18] Peterson L. and Davie B., Computer Networks: A Systems Approach , Morgan Kaufmann Publishers Inc., Fourth Edition, 2007.
[19] Peyravian M., Matyas S., and Zunic N., Decentralized Group Key Management For Secure Multicast Communications, Computer Communications , vol. 22, pp. 118351187, 1999.
[20] Pour A., Kumekawa K., Kato T. and Itoh S., A Hierarchical Group Key Management Scheme for Secure Multicast Increasing Efficiency of Key Distribution in Leave Operation, Computer Networks , vol. 51, pp. 472754743, 2007.
[21] Rafaeli S. and Hutchinson D., A Survey of Key Management for Secure Group Communication, ACM Computing Surveys, vol. 35, no. 3, pp. 3095 329, 2003.
[22] Rafaeli S. and Hutchinson D., Hydra: A Decentralized Group Key Management, Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop , pp. 625 67, June 2002.
[23] Setia S., Zhu S., and Jajodia S., A Scalable and Reliable Key Distribution Protocol For Multicast Group Rekeying, Technical report, George Mason University , 2002.
[24] Srinivasan R., Vaidehi V., Rajaraman R., and Kanagaraj S., Secure Group Key Management Scheme For Multicast Networks, International Journal of Network Security , vol. 11, no. 1, pp. 33538, 2010.
[25] Steiner M., Tsudik G., and Waidner M., Key Agreement In Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 7695780, 2000.
[26] Wallner D., Harder E., and Agee R., Key Management for Multicast: Issues and Architectures, National Security Agency , RFC 2627, 1999.
[27] Wittmann R. and Zitterbart M., Multicast Communication Protocols, Programming and Applications , Morgan Kaufmann Publishers Inc., 2000. Kanimozhi Sakthivel received ME degree in Computer Science and Engineering from Anna University of Technology, Coimbatore. Currently she is pursuing PhD in IST department from Anna University, Chennai.. Velumadhava Rao Rajasekaran received the BE degree in Computer Science and Engineering from C.I.E.T, Coimbatore and ME degree in Software Engineering from Anna University, Chennai, India. He is currently working as an Assistant Professor in Rajalakshmi Institute of Technology, Chennai. He is also pursuing his Part Time Ph.D in Computer Science and Engineering from Anna University, Chennai. Selvamani Kadirvelu received B.E degree in Electrical and Electronics Engineering from Annamalai University and M.E degree in Computer Science and Engineering from Bharathiyar University and Ph.D degree in Information and Communication Engineering from Anna University. He is currently working as Assistant Professor in College of Engineering, Guindy, Anna University, Chennai. Kannan Arputharaj received the M.E degree Computer Science and Engineering from Anna University and Ph.D degree in Information and Communication Engineering from Anna University. He is currently working as Professor in IST, College of Engineering, Guindy, Anna University, Chennai.