Design, implementation and performance analysis of secure group communications

  • Authors:
  • H. R. Nagesh;K. Chandra Sekaran;K. M. Hebbar

  • Affiliations:
  • III Sem., M.Tech.(CSE), KREC, Surathkal;Prof. & Head, Dept. of Computer Engineering, KREC, Surathkal;Prof. & Head, Dept of Computer Engineering, NMAMIT, Nitte

  • Venue:
  • ICCC '02 Proceedings of the 15th international conference on Computer communication
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many emerging network applications (e.g. teleconference, information services, distributed interactive simulation, and collaborative network) are based on a group communications model. As a result, securing group communications, i.e., providing confidentiality, authenticity, and integrity of messages delivered between group members, will become networking issue. A secure group is a triple (U, K, R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. Secure groups are specified using key graphs [1]. Three rekeying strategies: user-oriented, key-oriented, and group-oriented for securely distributing rekey messages after a join or leave are designed. Protocols for joining and leaving secure groups are designed and implemented. The rekeying strategies and join or leave protocols are implemented in a key server. This paper deals with design, implementation and performance analysis of a separate group key server as well as a client, which implements join/leave protocols for all three rekeying strategies. The strategy is worked on client/server basis in a hierarchical fashion, structured as a tree with the server at the root and groups forming the nodes ending up in clients. The height of the tree has been kept as constant (=3). Because of this height, join and leave operations will become easier. Public key cryptosystem has been used for encryption, decryption of rekey messages, and messages (key length=1024-bits). Behavior of the system for user-oriented, key-oriented, and group-oriented rekeying strategies is experimented and reported in this paper.