On optimal batch rekeying for secure group communications in wireless networks
نویسندگان
چکیده
Advances in wireless communications and 5 mobile computing have led to the emergence of group 6 communications and applications over wireless. In many of 7 these group interactions, new members can join and current 8 members can leave at any time, and existing members 9 must communicate securely to achieve application-specific 10 missions or network-specific functionality. Since wireless 11 networks are resource-constrained, a key challenge is to pro12 vide secure and efficient group communication mechanisms 13 that satisfy application requirements while minimizing 14 communications costs. Instead of individual rekeying, 15 i.e., performing a rekey operation right after each join or 16 leave request, periodic batch rekeying has been proposed 17 to alleviate rekeying overhead in resource-constrained 18 wireless networks. In this paper, we propose an analytical 19 model to address the issue of how often batch rekeying 20 should be performed. We propose threshold-based batch 21 rekeying schemes and demonstrate that an optimal rekey 22 interval exists for each scheme. We further compare these 23 schemes to identify the best scheme that can minimize the 24 communications cost of rekeying while satisfying appli25 cation requirements when given a set of parameter values 26 characterizing the operational and environmental conditions 27 of the system. In a highly dynamic wireless environment in 28 which the system parameter values change at runtime, our 29 work may be used to adapt the rekeying interval accordingly. 30 J.-H. Cho ( ) · I.-R. Chen · M. Eltoweissy Department of Computer Science, Virginia Tech e-mail: [email protected] I.-R. Chen e-mail: [email protected] M. Eltoweissy e-mail: [email protected]
منابع مشابه
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks
We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and the best batch rekey interval und...
متن کاملPerformance Analysis of Batch Rekey Algorithm for Secure Group Communications
The efficiency of rekeying is a main factor that influences the performance of secure group communications. Periodic batch rekeying for users join/leave is an effective way to improve the efficiency of rekeying. In this paper, we introduce queue theory into the batch rekey algorithm, and construct a model of batch rekey algorithm based on the queue theory. We then analyze the performance influe...
متن کاملOptimizing batch Rekeying interval for Secure Group Communication based on Queuing Model
Rapid growth of Internet spawns many group oriented multicast applications like Internet pay TV, news dissemination and stock quote system. The fortes of these applications are the support of dynamic, scalable group membership and group members are geographically divergent. As members of the group move in and out, an imperative cryptographic rekeying model should be applied to preserve the conf...
متن کاملEnergy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks
In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques that rely on logical hierarchies, are energy inefficient. We show that great energy savings can occur when physical location information is considered in the key distribution scheme construction. We also s...
متن کاملSecure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distributing rekeying messages and specify techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (sessi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Networks
دوره 14 شماره
صفحات -
تاریخ انتشار 2008