220 likes | 330 Views
This paper explores secure multicast communication, focusing on key distribution and updates during group changes within wireless networks. It distinguishes between intra-group and inter-group communication and proposes a novel approach that optimizes secure group communication while addressing common challenges faced in existing methods. By employing symmetric keys and polynomial techniques for key determination, the proposal enhances security, efficiency, and scalability, ensuring robust protection against eavesdropping and impersonation threats.
E N D
Key Distribution and Update for Secure Inter-group Multicast Communication Weichao Wang, Bharat Bhargava Youngjoo, Shin 2006.09.12
Contents • Introduction • Assumptions • Straight forward approach • New approach • Secure group communication • Key update during group changes • Discussions • Conclusions Key Distribution and Update for Secure Inter-group Multicast Communication
Introduction • Secure multicast has become an important component of many applications in wireless networks • Two types of group communications • Intra-group communication • Inter-group communication • This paper proposes a mechanism of key distribution and update for secure group communication Intra-group communication Inter-group communication Key Distribution and Update for Secure Inter-group Multicast Communication
Assumptions • Network and communication model • The links among wireless nodes are bidirectional • Two neighboring nodes can always send packets to each other • A centralized group manager (GM) is in charge of key distribution and key update • Threat model • Eavesdropping • Impersonation • Backward secrecy • Forward secrecy Key Distribution and Update for Secure Inter-group Multicast Communication
Straight forward approach • GM deploys a public-private key pair for each group GM PubG2PubG3PriG1 PubG1PubG2PriG3 PubG1PubG3PriG2 EPubG2(M) EPriG1(M) G1 G2 G3 Key Distribution and Update for Secure Inter-group Multicast Communication
Straight forward approach • Three major disadvantages • The public-private key encryption involves exponential computation • Not efficient for a wireless node • The GM will be overwhelmed by the computation overhead for generating secure public-private key pairs when a group changes • An attacker can easily impersonate another node • Since the public keys are known to every node Key Distribution and Update for Secure Inter-group Multicast Communication
New approach • Symmetric keys are used to protect the multicast traffic in intra-group communication • Polynomials are adopted to determine the keys to protect inter-group communication • Flat tables are adopted to distribute keys via broadcast when a group changes Key Distribution and Update for Secure Inter-group Multicast Communication
Secure group communication • Intra-group communication GM EKi-GM(K2) EKj-GM(K2) EK2(M) i j EK2(M) EKk-GM(K2) k G2 Ki-GM - pairwise key shared between node i and the GM K2 - group key shared by members of G2 Key Distribution and Update for Secure Inter-group Multicast Communication
Secure group communication • Inter-group communication GM h12(x)h13(x)h21(j)h31(j) h21(x)h23(x)h12(i)h32(i) h31(x)h32(x)h13(k)h23(k) Dh21(j)(Eh21(j)(M)) j i k Eh21(j)(M) G1 G2 G3 h(x) - t-degree polynomial to determine the keys for decrypting the multicast traffic from other group h(i) - personal key share to encrypt multicast traffic sent to the other group Key Distribution and Update for Secure Inter-group Multicast Communication
Secure group communication • Secret keys held by node i in group G2 and their usage Key Distribution and Update for Secure Inter-group Multicast Communication
Secure group communication • Secret key refreshment using the flat table • Flat table • Consists of 2r keys • r : the number of bits that are required to represent a node ID (r=┌log2n┐) • E.g., (z1.0, z1.1, z2.0, z2.1, … , zr.0, zr.1) • Every group has its own flat table • Every node has a set of keys in the flat table for its group • E.g., If r=4, a node ID with 10 can be represented as (1010)2 • Flat table : (z1.0, z1.1, z2.0, z2.1, z3.0, z3.1, z4.0, z4.1) • The node has a set of keys (z1.1, z2.0, z3.1, z4.0) • Every pair of nodes in the same group must have at least one different key • Because every node has a unique ID • E.g., a node ID with 10 has a set of keys (z1.1, z2.0, z3.1, z4.0) a node ID with 11 has a set of keys (z1.1, z2.0, z3.1, z4.1) Key Distribution and Update for Secure Inter-group Multicast Communication
Secure group communication • Secret key refreshment (Cont’d) • The flat table has brought two features • Only one node in a group can decrypt the message • Node i will have the keys (z1.i1, z1.i2, z2.i3, z2.i4, … , zr.ir) • can be decrypt by only node I • All the nodes but one node can decrypt the message • Node i will have the keys (z1.i1, z1.i2, z2.i3, z2.i4, … , zr.ir) • can be decrypt by all the nodes but node i Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group joining operations GM EK1(K’1) EK1(K’1) a b i EK1(K’1) c G1 Step1. Update group key K1 Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group joining operations GM M : M M a b i M c G1 Step2. Update the new flat table for group G1 Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group joining operations GM M : EK1(h’12(x), h’13(x)) M M a b i M c G1 Step3. Update the polynomials for inter-group communication Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group joining operations GM EK1-GM(K’1, h’12(x), h’13(x), z’1.i1,…z’r.ir) a b i c G1 Step4. GM distributes the keys to node i Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group leaving operations GM M : M M M M a b i c G2 Step1. Update group key K2 Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group leaving operations GM M : M M M M a b i c G2 Step2. Update the new flat table for group G2 Key Distribution and Update for Secure Inter-group Multicast Communication
Key update during group changes • Group leaving operations GM M : EK’2(h’21(x), h’23(x)) M M M M a b i c G2 Step3. Update the polynomials for inter-group communication Key Distribution and Update for Secure Inter-group Multicast Communication
Discussions • Overhead • Compared to the group changes, the encryption and decryption of the traffics happen much more frequently • Additional transmission overhead for key refreshment is totally paid off • The adoption of polynomials enables the distribution of personal key shares • Difficult for an attacker to impersonate another node • When a node changes its group, new keys must be established by the group manager • Much efficient to choose several t-polynomials Key Distribution and Update for Secure Inter-group Multicast Communication
Conclusions • Adopts polynomials to support the distribution of personal key shares • Employ flat tables to achieve efficient key refreshment • Reduces the computation overhead to process the packets • Becomes more difficult for an attacker to impersonate another node Key Distribution and Update for Secure Inter-group Multicast Communication
Question? Key Distribution and Update for Secure Inter-group Multicast Communication