CFP last date
20 May 2024
Reseach Article

Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey

by Trust Tshepo Mapoka
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 12
Year of Publication: 2013
Authors: Trust Tshepo Mapoka
10.5120/14629-2985

Trust Tshepo Mapoka . Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey. International Journal of Computer Applications. 84, 12 ( December 2013), 28-38. DOI=10.5120/14629-2985

@article{ 10.5120/14629-2985,
author = { Trust Tshepo Mapoka },
title = { Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 12 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number12/14629-2985/ },
doi = { 10.5120/14629-2985 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:44.869904+05:30
%A Trust Tshepo Mapoka
%T Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 12
%P 28-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Key management is equally important as compared to any other security measure such as encryption and authentication. With the growing usage of mobile devices and the advent of multicast communication, there has been a significant amount of work carried out in developing an optimum group key management protocol for mobile multicast systems. Key management is widely being adopted in securing group communication for both wired and wireless networks. Securing group communication over wired networks is fairly well established; however, wireless networks bring additional challenges due to member mobility and increase in the number of members. This paper presents a comprehensive survey of group key management protocols in wireless mobile environments that employ multicast communication. They are classified into network dependent and independent protocols and further categorized into tree-based and cluster-based key management protocols. The survey clearly outlines the characteristics of each protocol along with highlighting their advantages and limitations with respect to real-world systems. The paper is concluded with a taxonomy of the individual protocols with respect to the defined requirements which provides a strong source of literature reference for researchers in this field.

References
  1. P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: a survey," Network, IEEE, vol. 17, pp. 30-36, 2003.
  2. Y. Challal and H. Seba, "Group Key Management Protocols: A Novel Taxonomy. ," Enformatika, International Journal of Information technology, vol. 2, 2005.
  3. J. Bibo and H. Xiulin, "A Survey of Group Key Management," in Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002.
  4. S. Rafaeli and D. Hutchison, " A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, pp. 309–329, September 2003 2003.
  5. I. Romdhani, M. Kellil, L. Hong-Yon, A. Bouabdallah, and H. Bettahar, "IP mobile multicast: Challenges and solutions," Communications Surveys & Tutorials, IEEE, vol. 6, pp. 18-41, 2004.
  6. C. Perkins, "RFC3344: IP Mobility Support for IPv4,". IETF RFC. Status: Proposed Standard. ,August 2002.
  7. R. Koodli, "RFC5568: Fast Handovers for Mobile IPv6," IETF RFC. Status: Proposed Standard. ,July 2009.
  8. D. Johnson, C. Perkins, and J. Arkko, " RFC3775: Mobility Support in IPv6," IETF RFC. Status: Proposed Standard. , June 2004.
  9. T. Hardjono and L. R. Dondeti, Multicast and Group Security: Artech House, 2003.
  10. S. Yan, W. Trappe, and K. J. R. Liu, "An efficient key management scheme for secure wireless multicast," in Communications, 2002. ICC 2002. IEEE International Conference on, 2002, pp. 1236-1240 vol. 2.
  11. S. Yan, W. Trappe, and K. J. R. Liu, "Topology-aware key management schemes for wireless multicast," in Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE, 2003, pp. 1471-1475 vol. 3.
  12. K. Brown and S. Singh, "RelM:Reliable Multicast for Mobile Networks," Computer Communications, vol. 21, pp. 1379-1400, 1998.
  13. L. Lin, L. Xueming, and C. Yong, "HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast," in Networking, Architecture, and Storage, 2007. NAS 2007. International Conference on, 2007, pp. 109-114.
  14. C. K. Wong, M. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs," ed. ACM SIGCOMM, 1998.
  15. D. A. McGrew and A. T. Sherman, " Key Establishement in Large Dynamic Groups using One-way Function Trees," Technical Report TR-0755,May 1998.
  16. W. Yiling, L. Phu Dung, and B. Srinivasan, "Hybrid Group Key Management Scheme for Secure Wireless Multicast," in Computer and Information Science, 2007. ICIS 2007. 6th IEEE/ACIS International Conference on, 2007, pp. 346-351.
  17. W. Yiling, L. Phu Dung, and B. Srinivasan, "Efficient Key Management for Secure Wireless Multicast," in Convergence and Hybrid Information Technology, 2008. ICCIT '08. Third International Conference on, 2008, pp. 1131-1136.
  18. E. Eidkhani, M. Hajyvahabzadeh, S. A. Mortazav, and A. N. Pour, "CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement," International Journal of Computer Networks & Communications (IJCNC), vol. 4, pp. 107-128, 2012.
  19. M. Sandirigama, S. Akihiro, and M. Noda, "Simple And Secure password authentication protocol," IEICE Trans. Com, vol. E83-B, pp. 1363-1365 2000.
  20. M. Hajyvahabzadeh, E. Eidkhani, S. A. Mortazavi, and A. N. Pour, "A New Group Key Management Protocol Using Code for Key Calculation: CKC," in Information Science and Applications (ICISA), 2010 International Conference on, 2010, pp. 1-6.
  21. R. Jong-Hyuk and L. Kyoon-Ha, "Key management scheme for providing the confidentiality in mobile multicast," in Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2006, pp. 5 pp. -1209.
  22. L. R. Dondeti, S. Mukherjee, and A. Samal, "Scalable secure one-to-many group communication using dual encryption," Computer Communications, vol. 23, pp. 1681-1701, 11/1/ 2000.
  23. C. Ming-Chin and L. Jeng-Farn, "MKMS: Multicast key management scheme for Proxy Mobile IPv6 networks," in Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on, 2011, pp. 1402-1405.
  24. G. Jianfeng, Z. Huachun, Z. Hongke, and H. Luo, "Multicast Extension Support for Proxy MIPv6," in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010, pp. 1-5.
  25. S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6," RFC 5213, August 2008.
  26. H. Soliman, C. Castelluccia, K. ElMalki, and L. Bellier, "Hierarchical Mobile IPv6 (HMIPv6) Mobility Management," RFC 5380, October 2008.
  27. S. Kamat, S. Parimi, and D. P. Agrawal, "Reduction in control overhead for a secure, scalable framework for mobile multicast," in Communications, 2003. ICC '03. IEEE International Conference on, 2003, pp. 98-103 vol. 1.
  28. S. Mittra, "Iolus: a framework for scalable secure multicasting," SIGCOMM Comput. Commun. Rev. , vol. 27, pp. 277-288, 1997.
  29. B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, et al. , "Secure group communications for wireless networks," in Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, 2001, pp. 113-117 vol. 1.
  30. C. Zhang, B. DeCleene, J. Kurose, and D. Towsley, "Comparison of inter-area rekeying algorithms for secure wireless group communications," Performance Evaluation, vol. 49, pp. 1-20, 9// 2002.
  31. M. Kellil, Olivereau, J. C. A. , and P. Janneteau, "Rekeying in secure mobile multicast communications," United States Patent Application Publications, US 2007/ 0143600 A1 2007.
  32. L. M. Kiah and K. M. Martin, "Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments," in Future Generation Communication and Networking (FGCN 2007), 2007, pp. 100-107.
  33. M. L. M. Kiah and K. M. Martin. , "Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments," International Journal of Security and its Applications, vol. 2, pp. 39-52, January 2008.
  34. M. L. M. Kiah and B. Daghighi, "An Implementation of Secure Group Communication in a Wireless Environment," International Journal of Computer and Electrical Engineering, vol. 4, December 2012.
  35. S. Gharout, A. Bouabdallah, M. Kellil, and Y. Challal, "Key management with host mobility in dynamic groups," presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.
  36. S. Gharout, A. Bouabdallah, Y. Challal, and M. Achemlal, "Adaptive Group Key Management Protocol for Wireless Communications," j-jucs, vol. 18, pp. 874--898, May 2012.
  37. W. Chung Kei, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," Networking, IEEE/ACM Transactions on, vol. 8, pp. 16-30, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile multicast security group key management wireless network