Scalable and Reliable Key Distribution 1/ Ryuzou NISHI † † Institute of Systems & Information Technologies (ISIT)

Slides:



Advertisements
Similar presentations
A Survey of Key Management for Secure Group Communications Celia Li.
Advertisements

Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Computer Networking Error Control Coding
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Cellular Communications
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Digital Data Transmission ECE 457 Spring Information Representation Communication systems convert information into a form suitable for transmission.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Coding and Error Control
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
Chapter 11 Error-Control CodingChapter 11 : Lecture edition by K.Heikkinen.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Error Control.
Reliability and Channel Coding
1 CMPT 371 Data Communications and Networking Spread Spectrum.
FELK 19: Security of Wireless Networks
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Digital Speech Transmission and Recovery. Overall System Output (speaker) Channel (coax cable) Receiver Circuit Input (microphone) Transmitter Circuit.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Secure Group Communication: Key Management by Robert Chirwa.
Lecture 8: Spread Spectrum
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
1 SNS COLLEGE OF ENGINEERING Department of Electronics and Communication Engineering Subject: Digital communication Sem: V Cyclic Codes.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Spread Spectrum Modulation Dr. Teerasit Kasetkasem.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Introduction to Digital and Analog Communication Systems
Week 7 Lecture 1+2 Digital Communications System Architecture + Signals basics.
1 Chapter 7. Spread Spectrum Wen-Shyang Hwang KUAS EE.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Tutorial 8 Mobile Communications Netrowks. Prob.1 Construct 4 Walsh (Orthogonal) codes for 4 different users by two methods. Assume that 4 users transmit.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
Topics discussed in this section:
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Code Division Multiple Access (CDMA) Transmission Technology
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
Lecture 12-13: Multi-access Aliazam Abbasfar. Outline.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Channel Coding and Error Control 1. Outline Introduction Linear Block Codes Cyclic Codes Cyclic Redundancy Check (CRC) Convolutional Codes Turbo Codes.
Digital Communications Chapter 6. Channel Coding: Part 1
CSE 5345 – Fundamentals of Wireless Networks
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Spread Spectrum Chapter 7.
Coding and Error Control
Spread Spectrum Chapter 7.
Design and Implementation of SUPnP Networks
Presentation transcript:

Scalable and Reliable Key Distribution 1/ Ryuzou NISHI † † Institute of Systems & Information Technologies (ISIT)

2/ Introduction Appearance of a large variety of application of an information and telecommunication e.g. Internet, Home automation, Sensor network, and so on In the conventional point-to-point communication, scalability is a issue. Broadcast communication is desired Issues of broadcast security 1. Communication reliability ・ Re-transmission request is a large load to transmitter ・ In a case of failure of receiving keys, it is impossible to decrypt following messages 2. Communication overhead frequent key-update cause communication overhead, and the overhead causes a degradation of communication reliability

Area : Key distribution for group key update in case of members' joining in or leaving from group in channel of poor quality, e.g. wireless, power line communication. Group key is used to encrypt or decrypt messages and is shared among all the members of a group. Goal : Reliable group key update where rekey message size is independent of group size, Introduction Our work

Previous Work scalability 4/ □ GKMP : Group Key Management Protocol Key server distributes an updated key to each member through unicast cannel O(N) □ LKH : Logical Key Hierarchy O(N) → O(log(N)) KdKd KeKe KfKf M1M1 M2M2 M3M3 M4M4 KbKb KaKa KcKc KgKg group key

Previous Work reliability 5/ □ FEC : Forward Error Correction In a sender, redundancy is added into an original data. If data error occur on the way, a receiver corrects the error. method coding gain BCH 2.1 dB Convolution 5.1 dB

Proposal : Basic idea □ Updated key is distributed by using Direct Sequence Spread Spectrum (DS-SS) communication scheme which spreading code are M-sequences (maximal-length sequences) 6/ 1 bit 1 period t ime Updated group key secret key M-sequence secret key ID shift multiplexer Updated group key M-sequence

Proposal : Cyclic shift M-sequence 7/ M-sequences 1 period M-sequences' auto- correlation curve i=j point M-sequences ( u 0,u 1, ・・・,u N- 1 ) Cyclic shift M-sequences U i = ( u i,u i+1, ・・・,u N-1, u 0, ・・・, u i- 1 ) A cross-correlation between U i and U j is maximum N at i=j, and -1 at i≠ j. And a cross-correlation between - U i and U j is maximum -N at i=j, and +1 at i≠ j. u i = +1 or -1 N: sequence's length

Proposal : Setup 8/ 1. The key server sends the secret key to each member in secure channel where secret key is depicted by GK digits and maximum number of each digit is N-1 2. The key server regroup all member into subgroups where the maximum number of members of each subgroup is N 3. The key server sends the M-sequences and ID(1,2,...,GK) Where a different subgroup uses a different M-sequence and each member of a same subgroup uses a different cyclic shift M- sequence generated from a same M-sequence. subgroup #1 subgroup #2 subgroup #Ns ・・・ M-seq.M 1 M-seq.M 2 M-seq.M Ns ID 1 ID 2 ID Ns Key server

9/ Proposal : Basic idea □ Updated key is distributed by using Direct Sequence Spread Spectrum (DS-SS) communication scheme which spreading code are M-sequences (maximal-length sequences) 1 bit 1period t ime Updated group key secret key M-sequence secret key ID shift multiplexer Updated group key M-sequence

Proposal : Secret key → M- sequence In the case that the number of k digit of member M1's secret key is i k, cyclic shift M-sequence ( u ik,u ik+1, ・・・,u N-1, u 0, ・・・, u ik-1 ) is generated by cyclically shifting M-sequence ( u 0,u 1, ・・・,u N-1 ) i k times. About each digit of the secret key, similar process are done. time M-seq. 1 period ( u i1,u i1+1, ・・・,u N-1, u 0, ・・・, u i1-1 ) 1 -st digit ( u iGK,u iGK+1, ・・・,u N-1, u 0, ・・・, u iGK-1 ) ・・・ GK-th digit M-seq. 1 period 10/

11/ Proposal : Basic idea □ Updated key is distributed by using Direct Sequence Spread Spectrum (DS-SS) communication scheme which spreading code are M-sequences (maximal-length sequences) 1 bit 1period t ime Updated group key secret key M-sequence secret key ID shift multiplexer Updated group key M-sequence

Proposal : ID shift and multiplier □ Sequence ( K id,K id+1, ・・・,K GK-1, K 0, ・・・,K id-1 ) is generated by cyclically shifting updated group key ( K 0,K 1, ・・・,K GK-1 ) id (value of ID) times. □ k-th value GK k (= +1or -1) of the sequence is multiplied with cyclic shift M-sequence ( u ik,u ik+1, ・・・,u N-1, u 0, ・・・,u ik-1 ) 12/ time GK 1 × ( u i1,u i1+1, ・・・,u N-1, u 0, ・・・, u i1-1 ) 1 -st digit GK Nr × ( u iNr,u iNr+1, ・・・,u N-1, u 0, ・・・, u iNr-1 ) ・・・ GK-th digit M-seq. 1 period

13/ Proposal : Basic idea □ Updated key is distributed by using Direct Sequence Spread Spectrum (DS-SS) communication scheme which spreading code are M-sequences (maximal-length sequences) 1 bit 1period t ime Updated group key secret key M-sequence secret key ID shift multiplexer Updated group key M-sequence

Proposal : Multiplexer □ Multiplier's outputs of all members are multiplexed as follows. For example, multiplexing of two members whose output sequence are U ( u 0,u 1, ・・・,u N- 1 ) and U' ( u' 0,u' 1, ・・・,u' N-1 ) output seq. U ( u 0,u 1, ・・・,u N-1 ) + output seq. U' ( u' 0,u' 1, ・・・,u' N-1 ) multiplexed seq. U+U' ( u 0 +u' 0, u 1 +u' 1, ・・・, u N-1 + u' N-1 ) 14/

Proposal : Decoding of group key 15/ ・・ ・ 2N length shift-register 2N length reference shift-register adder ・・ ・ sampler decoded GK received signal Group key bit can be decoded from the polarity of the adder’s output

Proposal : Decoding of group key 16/ ・・ ・ 2N length shift-register 2N length reference shift-register adder ・・ ・ sampler decoded GK received signal Decoder's output includes the following signals ・ auto-correlation ( this corresponds to sent group key ) ・ closs-correlation between cyclic shift M-sequences which shift times are different, but original M-sequence is same. ・ closs-correlation between different M-sequences

Proposal : Example of decoder's output 17/ Supportable group sizeGK k (+) 1bit quant. (+) 1bit quant.(-) ×2 127 ×3 group key size:128 bits 、 M-sequence size 127bit group size ( number of members ) rekey message size (bit) 3 × × 3 ×127 GKMP 128× 127 proposal 127 GK k (-) 127 ×4 GK k (+) : decoder’s output when polarity of the sent group key is plus(+) GK k ( - ) : decoder’s output when polarity of the sent group key is minus( - ) 1bit quant. (+) : multiplexer’s output is quantized by 1bit when polarity of the sent group key is plus(+) 1bit quant. ( - ) : multiplexer’s output is quantized by 1bit when polarity of the sent group key is plus( - ) The larger decoder‘s output absolute becomes, the stronger the immunity to the noise becomes.

Proposal : Reliability ・ Conventional approach ( approach using FEC without ARQ ) improved SNR ( by coding gain ) 5 dB ( coding ratio : 0.5 、 convolutional coding ) ・ Proposal improved SNR ( by despreading effect ) 16 dB ( = 10 * log(44) ) Criterion : improved SNR for required reliability (error rate) SNR : Signal to Noise Ratio 18/

Proposal : Security 19/ The proposal’s security is based on that member which should be revoked, does not know the number of times of the shift of cyclic shift M-sequences of other members Can an attacker know the number of times of the shift, if he know the original M-sequence and get the receiver? …No. Because the decoder output is multiplexed signal as follows. Only legitimate member who knows the number of times of the shift, can decode group key. Decoder output

Conclusion We propose the scalable and reliable key distribution scheme where rekey message size is indepedent of group size by using DS-SS communication scheme which spreading code is M-sequences including cyclic shift M-sequences. The proposal improves the reliability of key and reduces the rekey message size. 20/