Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks

무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법

  • 허준범 (한국과학기술원 전산학과) ;
  • 윤현수 (한국과학기술원 전산학과)
  • Published : 2010.02.15

Abstract

Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

무선 메쉬 네트워크 환경에서 그룹통신은 동적으로 변화하는 중계 메쉬 노드, 서로 다른 도메인의 그룹 간 통신에 대한 접근 제어, 그리고 네트워크를 관리하는 중앙화된 관리서버의 부재 등의 문제로 인해 관리가 어려워진다. 그룹의 멤버 뿐 아니라 위상이 동적으로 변화하는 무선 메쉬 네트워크 환경에서의 다대다(many-to-many) 멀티캐스트는 각 그룹 관리자가 자신의 그룹 멤버를 독립적으로 관리하며 그룹간 통신을 제어하는 다수의 하위 그룹으로 이루어진 비중앙화된 구조에 기반해서 구성될 수 있다. 본 논문에서는 네트워크의 위상을 고려한 비중앙화된 그룹키 관리 기법을 제안한다. 제안하는 프로토콜에서 각 멀티캐스트 송신자는 아이디 기반 암호화 알고리즘을 이용해서 분산화된 방법으로 각 그룹키를 그룹 멤버에게 전달하게 된다. 아이디 기반 암호화 기법은 그룹 멤버 뿐 아니라 메쉬 노드의 동적인 변화에도 효율적인 키관리를 가능케 하기 때문에 다대다 멀티캐스트 환경에서 키 갱신에 필요한 통신 회수 및 저장해야 할 키의 크기가 줄어드는 장점이 있다. 따라서 제안한 기법은 중앙화된 네트워크 관리자가 없고, 다수의 서비스 제공자가 그들의 그룹 통신을 독립적으로 관리하는 대규모의 동적인 메쉬 네트워크에서의 다대다 그룹통신 환경에 가장 적합하다.

Keywords

References

  1. I. F. Akyildiz, X. Wang, W. Wang, Wireless Mesh Networks: A Survey, Computer Networks 47 (March 2005), pp.445-487. https://doi.org/10.1016/j.comnet.2004.12.001
  2. IEEE Std 802.16-2004, Air Interface for Broadband Wireless Access Systems, October 2004.
  3. Y. Zhang, Y. Fang, A Secure Authentication and Billing Architecture for Wireless Mesh Networks, Wireless Networks 13 (2007), pp.663-678. https://doi.org/10.1007/s11276-006-8148-z
  4. S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys 35 (September 2003), pp.309-329. https://doi.org/10.1145/937503.937506
  5. A. Ivan, Y. Dodis, Proxy Cryptography Revisited, in: Proceedings Network and Distributed System Security Symposium (February 2003).
  6. WiMAX Forum, "Mobile WiMAX-Part I: A Technical Overview and Performance Evaluation," February 2006.
  7. D. Huang, D. Medhi, A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication, ACM Transactions on Information and System Security 7 (November 2004), pp.1-30. https://doi.org/10.1145/984334.984335
  8. C. K. Wong, M. G. Gouda, and S. S. Lam, Secure Group Communications Using Key Graphs, in: Proceedings ACM SIGCOMM (September 1998), pp.68-79.
  9. D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using Oneway Function Trees, Tech. Rep. No. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md.
  10. S. Mittra, Iolus: A Framework for Scalable Secure Multicasting, in: Proceeding ACM SIGCOMM (September 1997), pp.277-288.
  11. A. N. Pour, K. Kumekawa, T. Kato, S. Itoh, A Hierarchical Group Key Management Scheme for Secure Multicast increasing Efficiency of Key Distribution in Leave Operation, Computer Networks 51 (August 2007), pp.4727-4743. https://doi.org/10.1016/j.comnet.2007.07.007
  12. M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, in: Proceedings ACM CCS (March 1996), pp.31-37.
  13. Y. Chiu, C. Lei, C. Huang, Secure Multicast Using Proxy Encryption, in: Proceedings International Conference on Information and Communications Security, Lecture Notes in Computer Science 3783 (December 2005), pp.280-290.
  14. C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, C.-L. Lei, Secure Multicast in Dynamic Environments, Computer Networks 51 (July 2007), pp.2805-2817. https://doi.org/10.1016/j.comnet.2006.11.027
  15. L. Dondeti, S. Mukherjee, A. Samal, Scalable Secure One-to-many Group Communication Using Dual Encryption, Computer Communication 23 (July 1999) pp.1681-1701.
  16. D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, in: Proceedings Crypto 2001, Lecture Notes in Computer Science 2139 (August 2001), pp.213-229.
  17. S. D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate Pairing, in: Proceedings 5th International Symposium on Algorithmic Number Theory, Lecture Notes in Computer Science 2369 (2002), pp.324-337.
  18. V. S. Miller, The Weil Pairing and Its Efficient Calculation, J. Cryptol. 17 (2004), pp.235-261.
  19. Y. J. Choie, E. Lee, Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2, in: Proceedings ICISC 2003, Lecture Notes in Computer Science 2971 (2004), pp.97-111.
  20. J. Hwu, R. Chen, Y. Lin, An Efficient Identitybased Cryptosystem for End-to-end Mobile Security, IEEE Trans. on Wireless Communications 5 (September 2006), pp.2586-2593. https://doi.org/10.1109/TWC.2006.1687783
  21. E. Fujisaki, T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, in: Proceedings Crypto 1999, pp.537-554.
  22. G. M. Bertoni, L. Chen, P. Fragneto, K. A. Harrison, G. Pelosi, Computing Tate Pairing on Smartcards (2005). http://www.st.com/stonline/products/families/smartcard/ches2005\_v4.pdf.
  23. M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Proceedings Crypto'98 (1998) pp.26-45.
  24. Y. Tsiounis, M. Yung, On the Security of ElGamal Based Encryption, in: Proceedings International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 1431 (February 1998), pp.117-134.
  25. D. R. Stinson. Cryptography Theory and Practice (3rd ed.) (Chapman & Hall/CRC, 2006).