DocumentCode :
857366
Title :
Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes
Author :
Sun, Yan Lindsay ; Liu, K. J Ray
Author_Institution :
Dept. of Electr. & Comput. Eng., Rhode Island Univ., Kingston, RI
Volume :
2
Issue :
2
fYear :
2007
fDate :
6/1/2007 12:00:00 AM
Firstpage :
213
Lastpage :
226
Abstract :
In secure group-oriented applications, key management schemes are employed to distribute and update keys such that unauthorized parties cannot access group communications. Key management, however, can disclose information about the dynamics of group membership, such as the group size and the number of joining and departing users. This is a threat to applications with confidential group membership information. This paper investigates techniques that can stealthily acquire group dynamic information from key management. We show that insiders and outsiders can successfully obtain group membership information by exploiting key establishment and key updating procedures in many popular key management schemes. Particularly, we develop three attack methods targeting tree-based centralized key management schemes. Further, we propose a defense technique utilizing batch rekeying and phantom users, and derive performance criteria that describe security level of the proposed scheme using mutual information. The proposed defense scheme is evaluated based on the data from MBone multicast sessions. We also provide a brief analysis on the disclosure of group dynamic information in contributory key management schemes
Keywords :
cryptography; multicast communication; telecommunication security; trees (mathematics); MBone multicast sessions; attack methods; confidential group membership information; defense technique; dynamic membership information; group key distribution schemes; key management schemes; phantom users; rekeying; secure group-oriented applications; tree-based centralized key management schemes; Cryptography; Data security; Imaging phantoms; Information analysis; Information management; Information security; Mutual information; Protection; Sun; Technology management; Communication system security, privacy;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2007.897274
Filename :
4202576
Link To Document :
بازگشت