Secure Multicast Group Management and Key Distribution in IEEE 802.21

被引:4
|
作者
Hanatani, Yoshikazu [1 ]
Ogura, Naoki [1 ]
Ohba, Yoshihiro [2 ]
Chen, Lidong [3 ]
Das, Subir [4 ]
机构
[1] Toshiba Co Ltd, Saiwai Ku, 1 Komukai,Toshiba Cho, Kawasaki, Kanagawa 2128582, Japan
[2] Toshiba Elect Asia Pte Ltd, 20 Pasir Panjang Rd, Singapore 117439, Singapore
[3] NIST, 100 Bur Dr, Gaithersburg, MD 20899 USA
[4] Appl Commun Sci, 150 Mt Airy Rd, Basking Ridge, NJ 7920 USA
来源
SECURITY STANDARDISATION RESEARCH, SSR 2016 | 2016年 / 10074卷
关键词
Group communication; Group key and management; Multicast; Group Key Block (GKB); Subtree; IEEE 802.21 (TM);
D O I
10.1007/978-3-319-49100-4_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controlling a large number of devices such as sensors and smart end points, is always a challenge where scalability and security are indispensable. This is even more important when it comes to periodic configuration updates to a large number of such devices belonging to one or more groups. One solution could be to take a group of devices as a unit of control and then manage them through a group communication mechanism. An obvious challenge to this approach is how to create such groups dynamically and manage them securely. Moreover, there need to be mechanisms in place by which members of the group can be removed and added dynamically. In this paper, we propose a technique that has been recently standardized in IEEE 802.21 (IEEE Std 802.21d (TM)-2015) with the objective of providing a standard-based solution to the above challenges. The approach relies on Logical Key Hierarchy (LKH) based key distribution mechanism but optimizes the number of encryption and decryption by using "Complete Subtree". It leverages IEEE 802.21 framework, services, and protocol for communication and management, and provides a scalable and secure way to manage (e.g., add and remove) devices from one or more groups. We describe the group key distribution protocol in details and provide a security analysis of the scheme along with some performance results from a prototype implementation.
引用
收藏
页码:227 / 243
页数:17
相关论文
共 50 条
  • [1] Verification of Group Key Management of IEEE 802.21 Using ProVerif
    Noguchi, Ryoga
    Hanatani, Yoshikazu
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (10): : 1533 - 1543
  • [2] Key management and distribution for secure multimedia multicast
    Trappe, W
    Song, J
    Poovendran, R
    Liu, KJR
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 544 - 557
  • [3] Decentralized group key management for secure multicast communications
    Peyravian, M
    Matyas, SM
    Zunic, N
    COMPUTER COMMUNICATIONS, 1999, 22 (13) : 1183 - 1187
  • [4] An efficient approach to group key management in secure multicast
    Pour, AN
    Kumekawa, K
    Kato, T
    Itoh, S
    Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 218 - 223
  • [5] A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    Pour, Alireza Nemancy
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    COMPUTER NETWORKS, 2007, 51 (17) : 4727 - 4743
  • [6] Optimal Key Distribution Scheme for Secure Multicast Group Communication
    Zhou, Zhibin
    Huang, Dijiang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [7] On Group Key Management for Secure Multicast Employing the Inverse Element
    Zhu, Wen Tao
    Deng, Robert H.
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 337 - +
  • [8] Key management for secure multicast group communication in mobile networks
    Kostas, T
    Kiwior, D
    Rajappan, G
    Dalal, M
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 41 - 43
  • [9] Cryptanalysis of two group key management Protocols for secure multicast
    Zhu, WT
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 35 - 48
  • [10] Hybrid group key management scheme for secure wireless multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 346 - +