KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’06 2007. 9. 5 Kim Pyung.

Slides:



Advertisements
Similar presentations
CIMCO Integration Software Products
Advertisements

IDMP-based Fast Handoffs and Paging in IP-based Cellular Networks IEEE 3G Wireless Conference, 2001 李威廷 11/22/2001 Telcordia.
A Survey of Key Management for Secure Group Communications Celia Li.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Group #1: Protocols for Wireless Mobile Environments.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
1 Channel Assignment Strategies Handoff (Handover) Process Handoff: Changing physical radio channels of network connections involved in a call,
Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec Presented by Seo Bon Keun, 2008.
KAIS T Scalable Key Management for Secure Multicast Communication in the Mobile Environment Jiannong Cao, Lin Liao, Guojun Wang Pervasive and Mobile Computing.
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
Handoff in Hybrid Mobile Data Networks Vijay Dadlani.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Group Key Distribution Chih-Hao Huang
Multimedia Broadcast/Multicast Service (MBMS)
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Secure Group Communication: Key Management by Robert Chirwa.
4G-MOBILE COMMUNICATION D.MANOJ KUMAR III. B.Tech, E.C.E N.B.K.R.Institue of Science and technology P.PALLAVI II. B.Tech, E.C.E Kakatiya Institue of Technology.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
An Introduction to CDMA Air Interface: IS-95A
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
Device-to-Device Communication in Cellular Networks Speaker: Tsung-Han Chiang Date: Feb. 24,
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
CELLULAR CONCEPT SHUSHRUTHA K S “Provide additional radio capacity with no additional increase in radio spectrum”
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Ch 16. Wireless WANs Cellular Telephony Designed to provide communication between two “moving” units – To track moving units (mobile station; MS),
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Group Key Distribution Xiuzhen Cheng The George Washington University.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
Wireless Communications Outline Introduction History System Overview Signals and Propagation Noise and Fading Modulation Multiple Access Design of Cellular.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Auto-configuration In Wireless Sensor Networks Nakjung Choi, Haeyong Kim, Minji Nam April Fools’ Day.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Guowei CHEN GITS, Waseda.
Cluster-Adaptive Two-Phase Coding Multi-Channel MAC Protocol (CA-TPCMMP) for MANETs 1 Lili Zhang, 1 Boon-Hee Soong, and 2 Wendong Xiao 1 School of Electrical.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
MBMS in GSM Evolution Systems – A Research Paper Magesh Annamalai – FAU Feeds – Grad Student Sr.Systems Engineer - Location Technology Group T - Mobile.
A PRESENTATION ON VOCATIONAL TRAINING IN BSNL. 2 3-Jul-16 GSM (Global System For Mobile Communication) The Global System for Mobile communications (GSM:
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Design and Implementation of SUPnP Networks
Thesis Work Presentation
An Introduction to CDMA Air Interface: IS-95A
Design and Implementation of OverLay Multicast Tree Protocol
Presentation transcript:

KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’ Kim Pyung

A Secure Group Key Management Scheme for Wireless Cellular Network Contents Introduction Handoff schemes Location tracking Pre-positioned secret sharing Group key management Simulation and result Conclusion

A Secure Group Key Management Scheme for Wireless Cellular Network Introduction : Multicast protocols Growths with multimedia streaming over wireless networks Access control mechanism Session key(SK) “forward message secrecy” and “backward message secrecy” Tree-based key management schemes advantages when update and maintain the SK (computation, communication, storage) Performance issues Scalable no “1 affects n” Matching the key tree to the network topology reduces 33%~45% traffic

A Secure Group Key Management Scheme for Wireless Cellular Network Introduction The suggested scheme “The neighbors on the key tree are also physical neighbors” A pre-positioned secret sharing scheme

A Secure Group Key Management Scheme for Wireless Cellular Network Handoff Schemes Handoff schemes are based on the location of a user L_ADD : the beginning of handoff L_DROP : the termination of handoff Soft handoff(30% handoff area) L_ADD : the boundary of overlapping area L_DROP : the middle of two BSs Hard handoff The same with “joining after leaving”

A Secure Group Key Management Scheme for Wireless Cellular Network Location Tracking In Code Division Multiple Access(CDMA) The forward link transmission timing is synchronized within a μs (using self-synchronization, radio beacons, or GPS) The backward link transmission timing is based on the received timing derived from the first multipath component

A Secure Group Key Management Scheme for Wireless Cellular Network Pre-Positioned Secret Sharing(PSS) m-shares Lagrange interpolation Over the finite field GF(q) a 0 is the shared secret group key

A Secure Group Key Management Scheme for Wireless Cellular Network Pre-Positioned Secret Sharing(PSS) The pre-positioned shares share i, 1≤i≤m, i≠j  user group The activation share(AS) share j  key server

Joining a group {s 4-6 } k4-5 AS, {s 1-6,s 4-6 } k6 AS, {s 1-6 } k1-5 A Secure Group Key Management Scheme for Wireless Cellular Network Group Key Management M1 M3 M4 B1 G M6 B2 M2M5 Group manager Subgroup managers Users s 1-5 © AS  k 1-5 {s 1-6 } k1-5  s 1-6 s 1-5  s 1-6 s 4-5  s 4-6 s 1-6, s 4-6, s 6 s 4-5 © AS  k 4-5 {s 4-6 } k4-5  s 4-6

Leaving a group AS, {s 1-6 } k1-5,{s 4-6 } k4-5 AS, {s 1-5 } k1-3 A Secure Group Key Management Scheme for Wireless Cellular Network Group Key Management M1 M3 M4 B1 G M6 B2 M2M5 Group manager Subgroup managers Users s 1-3 © AS  k 1-3 {s 1-5 } k1-3  s 1-5 s 1-6  s 1-5 s 4-6  s 4-5 s 1-6  s 1-5 s 4 © AS  k 4 | s 5 © AS  k 5 {s 4-5 } k4  s 4-5 | {s 4-5 } k5  s 4-5 s 4-5 © AS  k 4-5 {s 1-5 } k4-5  s 1-5

Handoff AS, {s 5-6 } k5,{s 5-6 } k6 AS, {s 1-4 } k4 AS, {s 1-4 } k1-3 A Secure Group Key Management Scheme for Wireless Cellular Network Group Key Management M1 M3 M6 B1 G M4 B2 M2M5 Group manager Subgroup managers Users s 1-3  s 1-4 s 4-6  s 5-6 s 1-3 © AS  k 1-3 {s 1-4 } k1-3  s 1-5 s 4 © AS  k 4 {s 1-4 } k4  s 1-4 s 5 © AS  k 5 | s 6 © AS  k 6 {s 5-6 } k5  s 5-6 | {s 5-6 } k6  s 5-6 {s 1-6 } k1-4, {s 1-6 } k5-6 ?

A Secure Group Key Management Scheme for Wireless Cellular Network Cost Analysis Tree-based scheme vs Pre-positioned secret sharing d : the degree of the tree h : the height of the tree ( the length of the longest directed path) The group key tree is assumed full and balanced Comparison of TBC and PSS schemes : Storage cost TBCPSS # of keys held by serverdn/(d-1)- # of keys held by each memberh- # of share sets held by server-dn/(d-1) # of share sets held by each member-h

Comparison of TBC and PSS schemes : Communication cost Join Leave A Secure Group Key Management Scheme for Wireless Cellular Network Cost Analysis TBCPSS JoinO(log d (n))O(d log d (n)) and O(1) LeaveO(log d (n))O(d log d (n)) and O(1) Periodic rekeyingO(d)O(1)

A Secure Group Key Management Scheme for Wireless Cellular Network Cost Analysis TBC computation cost PSS computation cost ServerRequesting member Non-requesting member Join2(h-1)h-1d/(d-1) Leaved(h-1)0d/(d-1) Periodic rekeyingd11 ServerRequesting member Non-requesting member Join2(h-1)h-1d/(d-1) Leaved(h-1)0d/(d-1) Periodic rekeying000

A Secure Group Key Management Scheme for Wireless Cellular Network Simulations and Results Simulation Parameters ParameterValue # of MX1 # of BS16 # of MSUp to 100 per BS Call generationPoisson with λ (calls/sec) Call durationExponential with 1/μ (1/sec) User mobility0-1 km/h (walking) 2-5 km/h (running) 6-25 km/h (low speed vehicle) km/h (high speed vehicle) Cell radius1 Km ServiceVoice, Data, Video L_ADD30% of BS coverage area L_DROPBoundary of BS

A Secure Group Key Management Scheme for Wireless Cellular Network Simulations and Results Number of key transaction 1 x (callgeneration) + 1 x (calltermination) + 2 x (# of Handoff) No call admission control(CAC) Call admission control(CAC)

A Secure Group Key Management Scheme for Wireless Cellular Network Conclusion New scheme the neighbors on the key tree – physical neighbors Pre-positioned secret sharing Simulation handoff during a call duration Need of call admission control

A Secure Group Key Management Scheme for Wireless Cellular Network Time for Any questions? Thank you for listening !