An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography

被引:13
|
作者
Sharma, Shikha [1 ]
Krishna, C. Rama [1 ]
机构
[1] NITTTR, Dept Comp Sci, Chandigarh, India
关键词
Group Communication; Distributed Group Key Management; Hierarchical Group Key Management;
D O I
10.1109/CICT.2015.116
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure and reliable group communication is an active area of research. Its popularity is fuelled by the growing importance of group-oriented and collaborative properties. The central research challenge is secure and efficient group key management. In this paper, we propose an efficient many-to-many group key management protocol in distributed group communication. This protocol is based on Elliptic Curve Cryptography and decrease the key length while providing securities at the same level as that of other cryptosystems provides. The main issue in secure group communication is group dynamics and key management. A scalable secure group communication model ensures that whenever there is a membership change, a new group key is computed and distributed to the group members with minimal communication and computation cost. This paper explores the use of batching of group membership changes to reduce the time and key re-distribution operations. The features of ECC protocol are that, no keys are exchanged between existing members at join, and only one key, the group key, is delivered to remaining members at leave. In the security analysis, our proposed algorithm takes less time when users join or leave the group in comparison to existing one. In ECC, there is only 1 key generation and key encryption overhead at join and leave operation. At join the communication overhead is key size of a node and at leave operation is 2 log(2) n - 2 x key size of a node.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [1] Hierarchical Key Management Scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Sharmila, R.
    Shalini, R.
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [2] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Uddalak Chatterjee
    Sangram Ray
    Dipanwita Sadhukhan
    Mou Dasgupta
    [J]. Innovations in Systems and Software Engineering, 2023, 19 : 231 - 246
  • [3] An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Sadhukhan, Dipanwita
    Dasgupta, Mou
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2023, 19 (03) : 231 - 246
  • [4] An authenticated group key transfer protocol using elliptic curve cryptography
    Jaiswal, Priyanka
    Tripathi, Sachin
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 857 - 864
  • [5] An authenticated group key transfer protocol using elliptic curve cryptography
    Priyanka Jaiswal
    Sachin Tripathi
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
  • [6] Distributed Key Management Based on Elliptic Curve Cryptography for Mobile Ad hoc Network
    Zhang Yuchen
    Liu Jing
    Wang Yadi
    Han Jihong
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 777 - 780
  • [7] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    [J]. 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [8] Efficient Region -Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography
    Kumar, K.
    Sumathy, V.
    Begum, J. Nafeesa
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1052 - +
  • [9] Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography
    Namal, Suneth
    Georgantas, Konstantinos
    Gurtov, Andrei
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1830 - 1835
  • [10] An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography
    Patel, Sankita J.
    Punjani, Dharmen
    Jinwala, Devesh C.
    [J]. International Journal of Network Security, 2015, 17 (03) : 328 - 339