Hi-KD: Hash-based hierarchical Key Distribution for Group Communication

نویسندگان

  • H. Ragab Hassan
  • A. Bouabdallah
  • H. Bettahar
  • Y. Challal
چکیده

Even though hierarchical group communication is a prominent communication model for a variety of applications, featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements, then we propose an efficient key management protocol satisfying those requirements. This work is done in the frame of a national french project whose consortium includes the international telecom company EADS, INRIA, CNRS and ENST-Paris. The project is called SafeCast and deals with group communication in PMR networks that are used mainly by security corps (police, fire fighters, soldiers,. . . ) in areas where it is difficult to have network infrastructures, such as war battles or following a natural disaster (earthquake, tsunami, tornado, . . . ).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Scalable Key Distribution Schemes for Secure Group Communication

Scalable secure key distribution is the most important feature of a scalable secure group communication protocol. Most of the existing scalable secure group communication protocols are based on a hierarchical key distribution tree. These schemes can be classified as hierarchical node based schemes and hierarchical key based schemes. In this paper; we compare recently proposed hierarchical key d...

متن کامل

Comments on the Yang-Chang-Hwang anonymous conference key distribution system

Yang et al. [Comput. Stand. Interfaces 25 (2003)] proposed a conference key distribution system (CKDS) based on the elliptic curve discrete logarithm problem (ECDLP). Their scheme used a line with a hash value to broadcast the conference key. In this article, we point out that it suffers from the attack by solving linear equations to obtain the hash value hi. Thus, the conference key CK can be ...

متن کامل

Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks

Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several is...

متن کامل

Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks

We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distributing rekeying messages and specify techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (sessi...

متن کامل

DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function

In sensor networks security is an important issue. Mission critical networks show great potential in emergency response and recovery. It is challenging to design a key management scheme to fulfill the required attributes for secure communication. The Secure Group Communication (SGC) requires common network wide key for confidentiality of control messages and data reports. The group key should b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005