SlideShare a Scribd company logo
ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 06|| June – 2016 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 21
Elliptic Curve for Secure Group Key Management in Distributed
Network
Athira Vijay1,
Deepa S Kumar2
1 PG Scholar, Dept. of Computer Science, College of Engineering Munnar,
2 Associate professor, Dept. of Computer Science, College of Engineering Munnar
I. INTRODUCTION
With the sudden growth in technology and network, group communication has become an increased concern in
terms of security. A secure group communication can be defined as a situation where a set of users communicate
with each other through messages in such a way that anyone outside the set will be unable to gather any
information even if they can obstruct the message. Confidentiality, integrity and authentication are the basic
security services provided by any trustworthy group communication system. Group key management lay the
basis for these services. So it is very necessary to ensure these services for efficient group communication.
Generally group key management protocol are classified into following three schemes:
1) Centralized: A centralized group key server take the responsibility of distributing and updating the group
key to all the members in the network. But, a breakdown of key server will affect all the group application
system. This is a major limitation of this scheme.
2) Decentralized: The groups are divided into different subgroups and a group key is shared between all group
members. Every subgroup share a common subgroup key. Every group have a group key server (GK) which
server all members in group and every subgroup have a subgroup key sever (SGK) which serve the
subgroup members.
3) Distributed: In the distributed group management protocols, each individual member in the group is
responsible for new group key generation and distribution. It is the most complex and difficult protocol.
But, it is the best option for networks such as MANET.
4) Here we design an application of elliptic curve cryptography in a distributed network such as MANET. A
MANET is a continuously self organizing and self configuring network. It is an application for distributed
system with no particular infrastructure and base station. For confidentiality, members of the network
exchange group keys for every membership change. This causes high computation overhead in the network.
The key goal of this paper is to exchange these keys possibly in a MANET securely and efficiently with
reduced computation overhead.
At times, several approaches have been proposed for distributed protocol to reduce the key size of group
communication. Most of them were based on different types of Diffie-Hellman key agreement protocol. The
main obstacle here is the large key size which will increase the computation overhead in the network.
In this paper, we propose a secure and authenticated group key management method in distributed network such
as MANET using elliptic curve cryptography, to reduce the key size, re-keying computation and communication
overhead compared to currently existing group key management approaches.
ABSTRACT
Group communication emphasis an important security criterion in the design of a distributed
network. All the members of the group must agree to a common session key. The management of this
session key refers to the group key management which is based on some group key agreement
protocol. In this paper we propose a group key management method for secure group communication
in a distributed network. Frequent change in group membership, and managing the key distribution
for new members are the two main problems to be faced in group communication that too with
minimal computation and communication overhead. Our system uses the concept of Elliptic curve
Cryptography that provide same level of security as that of other cryptosysytems with reduced key
size. This results in less re-keying and re-distribution operations, thus reducing computation and
communication overheads respectively.
Keywords: Computation cost, Communication cost, Distributed network, Elliptic Curve
cryptography, Group communication, Key management, MANET, Security.
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 22
II. RELATED WORKS
Many works have been done in the field of group key management for secure communication. The papers
enlisted from [4] to [14] discuss similar and typical approaches carried out in the field using different types of
Diffie-Hellman key agreement protocols. The main drawback of these approaches is that, they either take high
computation overhead or high communication cost or both.
Diffie-Hellman and Symmetric Algorithm (DHSA) [4] uses hierarchical approach to manage the keys logically.
In this protocol, Diffie-Hellman key agreement and symmetric key are combined and assigned to the leaf nodes
of the key tree and to intermediate nodes respectively. The drawbacks of this protocol are that key size is very
large and modulo operation takes long computational time which makes the computation slow.
Paper describing secure group key agreement protocol using ECC (Elliptic Curve Cryptography) [8] is based on
authenticated group key agreement protocol for wireless scenario. The protocol uses the concepts of elliptic
curve cryptography to reduce the computation overheads and Asymmetric Encryption Standards(AES) to
maintain efficiency. It consists of a set of users and a trustworthy server, where both of them contribute to create
the group key. The performance and security analysis shows that the proposed protocol is secure and performs
better in terms of computation cost. But as compared to the proposed system, the communication cost will be
high due to larger key size, which accounts to the main drawback of this protocol.
Distributed group key agreement uses basically different variations of n-party Diffie-Hellman key agreement[9].
The main drawback of this system is that, the members must be synchronized to continuously calculate the
parent’s key from that of children. If any member is slow in re-keying computation, the packet will be delayed
and the process will be postponed or disrupted. Also, there are dependencies among node keys which may break
all ancestral keys in case of any compromise in key computation.
Tree based Group Diffie-Hellman (TGDH) [13] approach again emphasis the use of two-party Diffie Hellman
key agreement protocol to a group. It also introduces the concept of hierarchical group key management. The
members at the leaf node maintains the key tree. Each intermediate node represents the key shared by its child
nodes that are computed with single Diffie-Hellman key agreement protocol. The protocol initializes again with
every membership change which lead to computational delay due to large cost of modular exponentiation.
III. PROPOSED SYSTEM
Every network is designed in such a way that every time a user join or leave the network, it causes some changes
to the members in the network. Here, we consider group of users in the network to make the join and leave of
new members and existing members reliable and secure. Since we use ECC for key calculation the system ensure
decreased re-keying overhead during member join and leave operation.
The main purpose of ECC here is not the key delivery, but is the calculation of group key for the associated
members of the group. Therefore, the main features of ECC that define the system are.
 In the hierarchical structure, leaf keys correspond to the public keys of the ECC key pair and all intermediate
node keys are symmetric keys
 A periodically updated list of public key and corresponding parent node binary code on every membership
change.
 Equally trusted and responsible group members with same capability
An elliptic curve over finite field with parameters a, b and P where, P is a prime and a point G on the curve whose
order is larger than is used. is the private key which is a random number between 1 and P-1 and therefore n
x G is obtained as the public key, which can be used to share common keys within members of the groups. For
example,
can share a key with by the common key
ECC introduces two types of codes in it’s key tree, binary code, used for member position discovery and decimal
code, used for intermediate node key calculation. Figure 1 illustrates a key tree with 8 members, { },
and its corresponding binary code. A list is maintained to find the public key of the member in the network with
whom a new incoming user wants to establish a connection. The list consist of the binay codes of intermediate
node just above the leaf nodes and their corresponding member’s public key. The list is updated whenever there is
a membership change and is informed to all the members through multicasting. Usually, the sibling member of
affected branch is responsible to send the updated information to other members.
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 23
Figure 1 : Key tree for member position discovery
Table I shows the list of binary code and public key of corresponding members. As in the table, the public keys
of is and that of is and their parent binary code is 000. Since doesn’t have a sibling
node, the list just shows the public key of that is, and the associated parent binary code, 00.
Table I. List of binary code and respective member’s public key.
Binary Code of Parent Child Public Key
000 ,
00
010 ,
011 ,
As mentioned before, other code is decimal which is used for intermediate node key calculation and is assigned to
each intermediate node in the key tree. The intermediate node key is calculated by a one way hash function of the
bitwise XOR of intermediate node code and the group key. It is defined in the following formula :
And the intermediate node code is calculated by the formula:
In the figure 2, the node code management is illustrated with 8 members { }. For example, if the
intermediate node code is 02 and generated random digit is 6, the code of the child node will be 026. Therefore,
the number of digits in a code represent, the number of nodes in that set of path.
During the join operation, the group key is sent to the new member, which is being encrypted using the shared
key by the new member’s sibling node. The new members can calculate it by using a one way hash function on
the previous key. If is a hash function and is the previous group key, then new key can be calculate as:
IV. DETAILED DESIGN
In the detailed design, we explain the join and leave operations of nodes to and from the network using the
example figures 1 and 2 for join and 3 for leave operation. Members of the network commonly agree to a large
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 24
prime p and the primitive element G for each group. These values are selected during the initial stage of key tree
establishment and are known publicly in the group.
During join operation of a new member to a group, he/she sends a hello message to discover the group members.
Those members, who receive the signal, look up their corresponding list. The member who does not have a
sibling member replies to the new node. But, if all the members have a sibling node, then the node with lowest
parent binary ID replies to the node. The member then exchanges the public key generated using Elliptic Curve
Cryptography. It is the sole responsibility of the member who replied to the new member to authenticate the
incoming new member. Here, we assume the group members are equipped with some authentication methods. In
advanced systems, an Elliptic Curve Digital Signature Algorithm can be used for this purpose.
Once the authentication is complete, the public key of new member and his/her corresponding parent binary
code is updated in the list and this information is multicast to all other members. Now, the previous members
and the new one can calculate the affected intermediate node keys by applying a given one way hash function to
bitwise XOR of the intermediate node code and new group key.
Figure 2: Intermediate node code and respective node key values
4.1. Join Operation
Fig. 1 and 2 explains the procedures taking place while a new member joins the multicast group of 7
members {
}
a. broadcast a hello message to all the members for member discovery.
b. The member who does not have a sibling node replies to the message. In our example, it is .
c. shares the common key with
d. downgrades it’s binary position from 00 to 001 and updates the member discovery table with its new
parent binary code and public key of new member (Table II)
e. New intermediate node key is calculated by for it’s new parent using :
f. then generates new group key as below:
g. then sends the new group key and node code to being encrypted using the common shared key
between them.
h. All other existing members renew the group key as described in step f.
i. The members in the affected set of path calculate the intermediate node key by applying one way hash
function to the bitwise XOR of the intermediate node code and and new group key.
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 25
Table II. Completely updated list after member join operation.
Binary Code of Parent Child Public Key
000 ,
00 ,
010 ,
011 ,
Here just one key is delivered to new member which is an important feature for distributed group
communication in wireless network. Since members dynamically join/leave the network in addition to their self
mobility, simultaneous join operation may take place here. Therefore, the ECC procedures are designed in such
a way that, the overload of join operation is minimized.
4.2. Leave Operation
When a member leaves the group, it’s node is deleted from the key tree. The sibling node upgrades it’s position to
the parent node position. And the sibling node of leaving node is responsible for deleting the public key from the
list and updating the information to other members in the group. After every leave operation some intermediate
node code and the group key need to be updated.
Figure 3 explains the procedures while a member leaves the multicast group of 8 members
{ }.
a. is promoted to it’s parent position.
b. changes the parent binary code and updates the member discovery list by removing the public key of
the leaving member from the list. It also informs other members in the group about the new update.
c. Now, the new group key is generated by using symmetric algorithm.
d. checks the member discovery list and using elliptic curve key agreement, shares a key with one of the
members in each sub group and then sends the new group key to the selected members.
e. and will now multicast the new group key to all the members in their respective sub group as
follows:
f. Finally, the mebers in the affected path set computer thrie new intermediate node code as follows:
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 26
Figure 3 : Leave operation on ECC
Table III represents the updated member discovery list after a member leaves the group. This ensure backward
secrecy by deleting the leaving nodes public key from the list.
Table III : Updated list after member leave operation
Binary Code of Parent Child Public Key
000 ,
00 ,
010 ,
011
V. IMPLEMENTATION AND RESULTS
The proposed concept is implemented for Mobile Ad-Hoc Network using Network Simulator 2(NS2). To
provide a realistic mobile environment, Ns2 is configured as follows: The proposed scheme is simulated by
taking 50 nodes in a 1670m X 970m topology area. All of the nodes are mobile with no base station or particular
infrastructure. In this mobility model, all the nodes moves with a constant speed chosen between a minimum
and maximum speed. The system is implemented with Ad-hoc On Demand Multipath Distance Vector routing
protocol . Table IV shows the chosen simulation parameters.
Table IV: Simulation Parameters
Parameters Value
Channel Type Channel/WirelessChannel
Radio-propagation model Propagation/TwoRayGround
network interface type Phy/WirelessPhy
MAC type Mac/802_11
Interface queue type CMUPriQueue
Antenna model Antenna/OmniAntenna
Max packet in interface queue 300
Number of mobile nodes 50
routing protocol AOMDV
Topology type Flatgrid
Topology size 1670 x 970
Initial energy in Joules 100
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 27
5.1. Simulation and Analysis
In any network there are possible chances of intruders, which may affect the network performance and security.
To analyse the performance of implemented network, we considered the following two metrices:
5.1.1. Throughput
Throughput can be defined as the actual rate at which data is transferred from a node to another. It is the ratio of
total bytes received by time.
Figure 4 : Performance measurement using throughput
5.1.2. End-to End Delay
End-to-end delay can be defined as the time taken by a packet to reach the appropriate destination from the
source. It is the difference between end time and start time.
Figure 5 : Performance analysis using delay
VI. CONCLUSION
In this paper, we have tried to develop a system for a distributed network such as MANET. This protocol is
based on logical key hierarchy because in this group members are arranged in hierarchical manner. The protocol
uses symmetric cryptosystem for intermediate nodes and asymmetric cryptosystem for leaf nodes. For
asymmetric key, Elliptic Curve Cryptography key agreement is introduced. Elliptic Curve Cryptography
provides much stronger security with smaller key size.
So we conclude this proposal by highlighting the contributions that, by using elliptic curves in the system, we
considerably reduced the key size, thus reducing the re-keying and re-distribution cost which further reduced the
computation and communication costs respectively. Analysis of performance improvement is another
Elliptic Curve for Secure Group Key Management in Distributed Network
www.ijceronline.com Open Access Journal Page 28
contribution that can be drawn from the simulation results by measuring the throughput and end-to-end delay of
the network. The network have been simulated with NS2 and while simulating with AOMDV, throughput and
end-to-end delay have improved drastically.
The future work of the system can be extended to the concept of providing individual authentication to all the
users in the network. Since elliptic curve cryptography is used in the proposed protocol, Elliptic Curve digital
Signature algorithm(ECDSA) can be used for this purpose. It can be ensured that, providing such an
authentication facility will provide more secure system in the future.
REFERENCES
[1]. Victor S Miller “Use of elliptic curves in cryptography” Lecture notes in computer sciences; 218 on Advances in cryptology---
CRYPTO 85 proceedings, Pages 417-426, Springer-Verlag New York, Inc. New York, NY, USA ©1986 .
[2]. Tarun Narayan Shankar, G. Sahoo “Cryptography with elliptic curves” International Journal Of Computer Science And
Applications Vol. 2, No. 1, April / May 2009.
[3]. Bibo Jiang, Xiulin Hu “A Survey of Group Key Management” 2008 International Conference on Computer Science and Software
Engineering.
[4]. Mortazavi, S. Anahita, Alireza Nemaney Pour, and Toshihiko Kato. "An efficient distributed group key management using
hierarchical approach with Diffie-Hellman and Symmetric Algorithm: DHSA." Computer Networks and Distributed Systems
(CNDS), 2011 International Symposium on. IEEE, 2011.
[5]. Kaur, Inderpreet, and A. L. N. Rao. "Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)." International
Journal of Computer Applications 70.11 (2013).
[6]. Xuanxia Yao, Xiaoguang Han, Xiaojiang Du, “A Light-Weight Certificate-Less Public Key Cryptography Scheme Based on
ECC” Computer Communication and Networks (ICCCN), 2014 23rd International Conference, pp. 1 – 8, Aug 2014.
[7]. Victor R.L. Shen Wei Chieh Huang2, Tzer Long Chen3 ” A Time- Bound Hierarchical Access Control For Multicast Systems”,
Machine Learning and Cybernetics (ICMLC), 2012 International Conference on (Volume:2 ), pp. 543 – 548, July 2012.
[8]. Priyanka laiswal, Abhimanyu Kumar, Sachin Tripathi ”Design of secure group key agreement protocol using elliptic curve
cryptography’’ High Performance Computing and Applications (ICHPCA), 2014 International Conference on 22-24 Dec. 2014,
pp. 1 – 6.
[9]. Yang, Fan, et al. "A Dynamic Layering Scheme of Multicast Key Management." Information Assurance and Security, 2009.
IAS'09. Fifth International Conference on. Vol. 1. IEEE, 2009.
[10]. Perrig, Adrian. "Efficient collaborative key management protocols for secure autonomous group communication." International
Workshop on Cryptographic Techniques and E-Commerce (CrypTEC’99). 1999.
[11]. Bouassida, Mohamed Salah, Isabelle Chrisment, and Olivier Festor. "Group Key Management in MANETs." IJ Network
Security 6.1 (2008): 67-79.
[12]. Liehuang, Zhu, et al. "An authenticated constant round group key agreement protocol based on elliptic curve
cryptography." IJCSNS 6.8B (2006): 131.
[13]. Kim, Yongdae, Adrian Perrig, and Gene Tsudik. "Tree-based group key agreement." ACM Transactions on Information and
System Security (TISSEC) 7.1 (2004): 60-96.
[14]. Rhee, Kyung-Hyune, Young-Ho Park, and Gene Tsudik. "A Group Key Management Architecture for Mobile Ad-hoc Wireless
Networks." Journal of Information science and engineering 21.2 (2005): 415-428.
[15]. Md Nizam Udin, Suhaila Abd Halim, Mohd Idris Jayes, Hailiza Kamarulhaili “Application of Message Embedding Technique
in ElGamal Elliptic Curve Cryptosystem”, Statistics in Science, Business, and Engineering (ICSSBE), 2012 International
Conference, pp. 1 – 6, Sept 2012
[16]. William Stalling, “Cryptography and Network Security, Principles and Practice” Prentice Hall, Fifth edition.
[17]. Behrouz A Forouzan “Cryptography and Network Security” McGraw Hill, Special Indian edition

More Related Content

PDF
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
PDF
An efficient distributed group key management using hierarchical approach wit...
PDF
A secure key computation protocol for secure group communication with passwor...
PDF
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
PDF
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
PDF
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
PDF
G1102014246
PDF
call for papers, research paper publishing, where to publish research paper, ...
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
An efficient distributed group key management using hierarchical approach wit...
A secure key computation protocol for secure group communication with passwor...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
G1102014246
call for papers, research paper publishing, where to publish research paper, ...

What's hot (20)

PDF
Vtu network security(10 ec832) unit 5 notes.
PDF
A Comparative Study of Group Key Management in MANET
PDF
Vtu network security(10 ec832) unit 3 notes.
PDF
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
PDF
Network and cyber security module(15ec835, 17ec835)
DOCX
Privacy preserving data sharing with anonymous id assignment
PDF
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
PDF
H0362052056
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
VTU network security(10 ec832) unit 6 notes
PDF
Vtu network security(10 ec832) unit 1 notes
PDF
Network security 10EC832 vtu notes
PDF
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
PDF
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
PDF
C0281010016
PDF
Virtual private network a veritable tool for network security
PDF
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
PDF
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
PDF
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
PDF
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Vtu network security(10 ec832) unit 5 notes.
A Comparative Study of Group Key Management in MANET
Vtu network security(10 ec832) unit 3 notes.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
Network and cyber security module(15ec835, 17ec835)
Privacy preserving data sharing with anonymous id assignment
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
H0362052056
Vtu network security(10 ec832) unit 2 notes..
VTU network security(10 ec832) unit 6 notes
Vtu network security(10 ec832) unit 1 notes
Network security 10EC832 vtu notes
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
C0281010016
Virtual private network a veritable tool for network security
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Ad

Viewers also liked (8)

PDF
11
PPTX
DOCX
Seminario Motivacional
PDF
Monica Brahm Recommendation Letter Scanned
PDF
Conheça meu trabalho para o bairro Saraiva, Vigilato e Lagoainha
PDF
317marzsesionesdeaprendizajeinicial 160711022038
PPTX
: Equipos y Herramientas del taller deelectromecanica
PPTX
Стратегия и план действий в отношении здоровья беженцев и мигрантов в Европей...
11
Seminario Motivacional
Monica Brahm Recommendation Letter Scanned
Conheça meu trabalho para o bairro Saraiva, Vigilato e Lagoainha
317marzsesionesdeaprendizajeinicial 160711022038
: Equipos y Herramientas del taller deelectromecanica
Стратегия и план действий в отношении здоровья беженцев и мигрантов в Европей...
Ad

Similar to Elliptic Curve for Secure Group Key Management in Distributed Network (20)

PDF
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
PDF
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
PDF
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
PPT
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
PDF
Message authentication between the nodes
PDF
15 s archana reddy final paper--160-170
PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
PDF
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
PDF
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
PPT
Project Proposal Presentation
PDF
call for papers, research paper publishing, where to publish research paper, ...
PDF
Implementation Secure Authentication Using Elliptic Curve Cryptography
PDF
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
PDF
A Survey on Elliptic Curve Cryptography
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
PDF
Data Security Using Elliptic Curve Cryptography
PDF
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
PDF
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Message authentication between the nodes
15 s archana reddy final paper--160-170
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Project Proposal Presentation
call for papers, research paper publishing, where to publish research paper, ...
Implementation Secure Authentication Using Elliptic Curve Cryptography
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Survey on Elliptic Curve Cryptography
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
Data Security Using Elliptic Curve Cryptography
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Well-logging-methods_new................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Construction Project Organization Group 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
DOCX
573137875-Attendance-Management-System-original
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Lecture Notes Electrical Wiring System Components
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Well-logging-methods_new................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Construction Project Organization Group 2.pptx
additive manufacturing of ss316l using mig welding
573137875-Attendance-Management-System-original
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Sustainable Sites - Green Building Construction
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CH1 Production IntroductoryConcepts.pptx

Elliptic Curve for Secure Group Key Management in Distributed Network

  • 1. ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 06|| June – 2016 || International Journal of Computational Engineering Research (IJCER) www.ijceronline.com Open Access Journal Page 21 Elliptic Curve for Secure Group Key Management in Distributed Network Athira Vijay1, Deepa S Kumar2 1 PG Scholar, Dept. of Computer Science, College of Engineering Munnar, 2 Associate professor, Dept. of Computer Science, College of Engineering Munnar I. INTRODUCTION With the sudden growth in technology and network, group communication has become an increased concern in terms of security. A secure group communication can be defined as a situation where a set of users communicate with each other through messages in such a way that anyone outside the set will be unable to gather any information even if they can obstruct the message. Confidentiality, integrity and authentication are the basic security services provided by any trustworthy group communication system. Group key management lay the basis for these services. So it is very necessary to ensure these services for efficient group communication. Generally group key management protocol are classified into following three schemes: 1) Centralized: A centralized group key server take the responsibility of distributing and updating the group key to all the members in the network. But, a breakdown of key server will affect all the group application system. This is a major limitation of this scheme. 2) Decentralized: The groups are divided into different subgroups and a group key is shared between all group members. Every subgroup share a common subgroup key. Every group have a group key server (GK) which server all members in group and every subgroup have a subgroup key sever (SGK) which serve the subgroup members. 3) Distributed: In the distributed group management protocols, each individual member in the group is responsible for new group key generation and distribution. It is the most complex and difficult protocol. But, it is the best option for networks such as MANET. 4) Here we design an application of elliptic curve cryptography in a distributed network such as MANET. A MANET is a continuously self organizing and self configuring network. It is an application for distributed system with no particular infrastructure and base station. For confidentiality, members of the network exchange group keys for every membership change. This causes high computation overhead in the network. The key goal of this paper is to exchange these keys possibly in a MANET securely and efficiently with reduced computation overhead. At times, several approaches have been proposed for distributed protocol to reduce the key size of group communication. Most of them were based on different types of Diffie-Hellman key agreement protocol. The main obstacle here is the large key size which will increase the computation overhead in the network. In this paper, we propose a secure and authenticated group key management method in distributed network such as MANET using elliptic curve cryptography, to reduce the key size, re-keying computation and communication overhead compared to currently existing group key management approaches. ABSTRACT Group communication emphasis an important security criterion in the design of a distributed network. All the members of the group must agree to a common session key. The management of this session key refers to the group key management which is based on some group key agreement protocol. In this paper we propose a group key management method for secure group communication in a distributed network. Frequent change in group membership, and managing the key distribution for new members are the two main problems to be faced in group communication that too with minimal computation and communication overhead. Our system uses the concept of Elliptic curve Cryptography that provide same level of security as that of other cryptosysytems with reduced key size. This results in less re-keying and re-distribution operations, thus reducing computation and communication overheads respectively. Keywords: Computation cost, Communication cost, Distributed network, Elliptic Curve cryptography, Group communication, Key management, MANET, Security.
  • 2. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 22 II. RELATED WORKS Many works have been done in the field of group key management for secure communication. The papers enlisted from [4] to [14] discuss similar and typical approaches carried out in the field using different types of Diffie-Hellman key agreement protocols. The main drawback of these approaches is that, they either take high computation overhead or high communication cost or both. Diffie-Hellman and Symmetric Algorithm (DHSA) [4] uses hierarchical approach to manage the keys logically. In this protocol, Diffie-Hellman key agreement and symmetric key are combined and assigned to the leaf nodes of the key tree and to intermediate nodes respectively. The drawbacks of this protocol are that key size is very large and modulo operation takes long computational time which makes the computation slow. Paper describing secure group key agreement protocol using ECC (Elliptic Curve Cryptography) [8] is based on authenticated group key agreement protocol for wireless scenario. The protocol uses the concepts of elliptic curve cryptography to reduce the computation overheads and Asymmetric Encryption Standards(AES) to maintain efficiency. It consists of a set of users and a trustworthy server, where both of them contribute to create the group key. The performance and security analysis shows that the proposed protocol is secure and performs better in terms of computation cost. But as compared to the proposed system, the communication cost will be high due to larger key size, which accounts to the main drawback of this protocol. Distributed group key agreement uses basically different variations of n-party Diffie-Hellman key agreement[9]. The main drawback of this system is that, the members must be synchronized to continuously calculate the parent’s key from that of children. If any member is slow in re-keying computation, the packet will be delayed and the process will be postponed or disrupted. Also, there are dependencies among node keys which may break all ancestral keys in case of any compromise in key computation. Tree based Group Diffie-Hellman (TGDH) [13] approach again emphasis the use of two-party Diffie Hellman key agreement protocol to a group. It also introduces the concept of hierarchical group key management. The members at the leaf node maintains the key tree. Each intermediate node represents the key shared by its child nodes that are computed with single Diffie-Hellman key agreement protocol. The protocol initializes again with every membership change which lead to computational delay due to large cost of modular exponentiation. III. PROPOSED SYSTEM Every network is designed in such a way that every time a user join or leave the network, it causes some changes to the members in the network. Here, we consider group of users in the network to make the join and leave of new members and existing members reliable and secure. Since we use ECC for key calculation the system ensure decreased re-keying overhead during member join and leave operation. The main purpose of ECC here is not the key delivery, but is the calculation of group key for the associated members of the group. Therefore, the main features of ECC that define the system are.  In the hierarchical structure, leaf keys correspond to the public keys of the ECC key pair and all intermediate node keys are symmetric keys  A periodically updated list of public key and corresponding parent node binary code on every membership change.  Equally trusted and responsible group members with same capability An elliptic curve over finite field with parameters a, b and P where, P is a prime and a point G on the curve whose order is larger than is used. is the private key which is a random number between 1 and P-1 and therefore n x G is obtained as the public key, which can be used to share common keys within members of the groups. For example, can share a key with by the common key ECC introduces two types of codes in it’s key tree, binary code, used for member position discovery and decimal code, used for intermediate node key calculation. Figure 1 illustrates a key tree with 8 members, { }, and its corresponding binary code. A list is maintained to find the public key of the member in the network with whom a new incoming user wants to establish a connection. The list consist of the binay codes of intermediate node just above the leaf nodes and their corresponding member’s public key. The list is updated whenever there is a membership change and is informed to all the members through multicasting. Usually, the sibling member of affected branch is responsible to send the updated information to other members.
  • 3. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 23 Figure 1 : Key tree for member position discovery Table I shows the list of binary code and public key of corresponding members. As in the table, the public keys of is and that of is and their parent binary code is 000. Since doesn’t have a sibling node, the list just shows the public key of that is, and the associated parent binary code, 00. Table I. List of binary code and respective member’s public key. Binary Code of Parent Child Public Key 000 , 00 010 , 011 , As mentioned before, other code is decimal which is used for intermediate node key calculation and is assigned to each intermediate node in the key tree. The intermediate node key is calculated by a one way hash function of the bitwise XOR of intermediate node code and the group key. It is defined in the following formula : And the intermediate node code is calculated by the formula: In the figure 2, the node code management is illustrated with 8 members { }. For example, if the intermediate node code is 02 and generated random digit is 6, the code of the child node will be 026. Therefore, the number of digits in a code represent, the number of nodes in that set of path. During the join operation, the group key is sent to the new member, which is being encrypted using the shared key by the new member’s sibling node. The new members can calculate it by using a one way hash function on the previous key. If is a hash function and is the previous group key, then new key can be calculate as: IV. DETAILED DESIGN In the detailed design, we explain the join and leave operations of nodes to and from the network using the example figures 1 and 2 for join and 3 for leave operation. Members of the network commonly agree to a large
  • 4. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 24 prime p and the primitive element G for each group. These values are selected during the initial stage of key tree establishment and are known publicly in the group. During join operation of a new member to a group, he/she sends a hello message to discover the group members. Those members, who receive the signal, look up their corresponding list. The member who does not have a sibling member replies to the new node. But, if all the members have a sibling node, then the node with lowest parent binary ID replies to the node. The member then exchanges the public key generated using Elliptic Curve Cryptography. It is the sole responsibility of the member who replied to the new member to authenticate the incoming new member. Here, we assume the group members are equipped with some authentication methods. In advanced systems, an Elliptic Curve Digital Signature Algorithm can be used for this purpose. Once the authentication is complete, the public key of new member and his/her corresponding parent binary code is updated in the list and this information is multicast to all other members. Now, the previous members and the new one can calculate the affected intermediate node keys by applying a given one way hash function to bitwise XOR of the intermediate node code and new group key. Figure 2: Intermediate node code and respective node key values 4.1. Join Operation Fig. 1 and 2 explains the procedures taking place while a new member joins the multicast group of 7 members { } a. broadcast a hello message to all the members for member discovery. b. The member who does not have a sibling node replies to the message. In our example, it is . c. shares the common key with d. downgrades it’s binary position from 00 to 001 and updates the member discovery table with its new parent binary code and public key of new member (Table II) e. New intermediate node key is calculated by for it’s new parent using : f. then generates new group key as below: g. then sends the new group key and node code to being encrypted using the common shared key between them. h. All other existing members renew the group key as described in step f. i. The members in the affected set of path calculate the intermediate node key by applying one way hash function to the bitwise XOR of the intermediate node code and and new group key.
  • 5. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 25 Table II. Completely updated list after member join operation. Binary Code of Parent Child Public Key 000 , 00 , 010 , 011 , Here just one key is delivered to new member which is an important feature for distributed group communication in wireless network. Since members dynamically join/leave the network in addition to their self mobility, simultaneous join operation may take place here. Therefore, the ECC procedures are designed in such a way that, the overload of join operation is minimized. 4.2. Leave Operation When a member leaves the group, it’s node is deleted from the key tree. The sibling node upgrades it’s position to the parent node position. And the sibling node of leaving node is responsible for deleting the public key from the list and updating the information to other members in the group. After every leave operation some intermediate node code and the group key need to be updated. Figure 3 explains the procedures while a member leaves the multicast group of 8 members { }. a. is promoted to it’s parent position. b. changes the parent binary code and updates the member discovery list by removing the public key of the leaving member from the list. It also informs other members in the group about the new update. c. Now, the new group key is generated by using symmetric algorithm. d. checks the member discovery list and using elliptic curve key agreement, shares a key with one of the members in each sub group and then sends the new group key to the selected members. e. and will now multicast the new group key to all the members in their respective sub group as follows: f. Finally, the mebers in the affected path set computer thrie new intermediate node code as follows:
  • 6. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 26 Figure 3 : Leave operation on ECC Table III represents the updated member discovery list after a member leaves the group. This ensure backward secrecy by deleting the leaving nodes public key from the list. Table III : Updated list after member leave operation Binary Code of Parent Child Public Key 000 , 00 , 010 , 011 V. IMPLEMENTATION AND RESULTS The proposed concept is implemented for Mobile Ad-Hoc Network using Network Simulator 2(NS2). To provide a realistic mobile environment, Ns2 is configured as follows: The proposed scheme is simulated by taking 50 nodes in a 1670m X 970m topology area. All of the nodes are mobile with no base station or particular infrastructure. In this mobility model, all the nodes moves with a constant speed chosen between a minimum and maximum speed. The system is implemented with Ad-hoc On Demand Multipath Distance Vector routing protocol . Table IV shows the chosen simulation parameters. Table IV: Simulation Parameters Parameters Value Channel Type Channel/WirelessChannel Radio-propagation model Propagation/TwoRayGround network interface type Phy/WirelessPhy MAC type Mac/802_11 Interface queue type CMUPriQueue Antenna model Antenna/OmniAntenna Max packet in interface queue 300 Number of mobile nodes 50 routing protocol AOMDV Topology type Flatgrid Topology size 1670 x 970 Initial energy in Joules 100
  • 7. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 27 5.1. Simulation and Analysis In any network there are possible chances of intruders, which may affect the network performance and security. To analyse the performance of implemented network, we considered the following two metrices: 5.1.1. Throughput Throughput can be defined as the actual rate at which data is transferred from a node to another. It is the ratio of total bytes received by time. Figure 4 : Performance measurement using throughput 5.1.2. End-to End Delay End-to-end delay can be defined as the time taken by a packet to reach the appropriate destination from the source. It is the difference between end time and start time. Figure 5 : Performance analysis using delay VI. CONCLUSION In this paper, we have tried to develop a system for a distributed network such as MANET. This protocol is based on logical key hierarchy because in this group members are arranged in hierarchical manner. The protocol uses symmetric cryptosystem for intermediate nodes and asymmetric cryptosystem for leaf nodes. For asymmetric key, Elliptic Curve Cryptography key agreement is introduced. Elliptic Curve Cryptography provides much stronger security with smaller key size. So we conclude this proposal by highlighting the contributions that, by using elliptic curves in the system, we considerably reduced the key size, thus reducing the re-keying and re-distribution cost which further reduced the computation and communication costs respectively. Analysis of performance improvement is another
  • 8. Elliptic Curve for Secure Group Key Management in Distributed Network www.ijceronline.com Open Access Journal Page 28 contribution that can be drawn from the simulation results by measuring the throughput and end-to-end delay of the network. The network have been simulated with NS2 and while simulating with AOMDV, throughput and end-to-end delay have improved drastically. The future work of the system can be extended to the concept of providing individual authentication to all the users in the network. Since elliptic curve cryptography is used in the proposed protocol, Elliptic Curve digital Signature algorithm(ECDSA) can be used for this purpose. It can be ensured that, providing such an authentication facility will provide more secure system in the future. REFERENCES [1]. Victor S Miller “Use of elliptic curves in cryptography” Lecture notes in computer sciences; 218 on Advances in cryptology--- CRYPTO 85 proceedings, Pages 417-426, Springer-Verlag New York, Inc. New York, NY, USA ©1986 . [2]. Tarun Narayan Shankar, G. Sahoo “Cryptography with elliptic curves” International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 2009. [3]. Bibo Jiang, Xiulin Hu “A Survey of Group Key Management” 2008 International Conference on Computer Science and Software Engineering. [4]. Mortazavi, S. Anahita, Alireza Nemaney Pour, and Toshihiko Kato. "An efficient distributed group key management using hierarchical approach with Diffie-Hellman and Symmetric Algorithm: DHSA." Computer Networks and Distributed Systems (CNDS), 2011 International Symposium on. IEEE, 2011. [5]. Kaur, Inderpreet, and A. L. N. Rao. "Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)." International Journal of Computer Applications 70.11 (2013). [6]. Xuanxia Yao, Xiaoguang Han, Xiaojiang Du, “A Light-Weight Certificate-Less Public Key Cryptography Scheme Based on ECC” Computer Communication and Networks (ICCCN), 2014 23rd International Conference, pp. 1 – 8, Aug 2014. [7]. Victor R.L. Shen Wei Chieh Huang2, Tzer Long Chen3 ” A Time- Bound Hierarchical Access Control For Multicast Systems”, Machine Learning and Cybernetics (ICMLC), 2012 International Conference on (Volume:2 ), pp. 543 – 548, July 2012. [8]. Priyanka laiswal, Abhimanyu Kumar, Sachin Tripathi ”Design of secure group key agreement protocol using elliptic curve cryptography’’ High Performance Computing and Applications (ICHPCA), 2014 International Conference on 22-24 Dec. 2014, pp. 1 – 6. [9]. Yang, Fan, et al. "A Dynamic Layering Scheme of Multicast Key Management." Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. Vol. 1. IEEE, 2009. [10]. Perrig, Adrian. "Efficient collaborative key management protocols for secure autonomous group communication." International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC’99). 1999. [11]. Bouassida, Mohamed Salah, Isabelle Chrisment, and Olivier Festor. "Group Key Management in MANETs." IJ Network Security 6.1 (2008): 67-79. [12]. Liehuang, Zhu, et al. "An authenticated constant round group key agreement protocol based on elliptic curve cryptography." IJCSNS 6.8B (2006): 131. [13]. Kim, Yongdae, Adrian Perrig, and Gene Tsudik. "Tree-based group key agreement." ACM Transactions on Information and System Security (TISSEC) 7.1 (2004): 60-96. [14]. Rhee, Kyung-Hyune, Young-Ho Park, and Gene Tsudik. "A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks." Journal of Information science and engineering 21.2 (2005): 415-428. [15]. Md Nizam Udin, Suhaila Abd Halim, Mohd Idris Jayes, Hailiza Kamarulhaili “Application of Message Embedding Technique in ElGamal Elliptic Curve Cryptosystem”, Statistics in Science, Business, and Engineering (ICSSBE), 2012 International Conference, pp. 1 – 6, Sept 2012 [16]. William Stalling, “Cryptography and Network Security, Principles and Practice” Prentice Hall, Fifth edition. [17]. Behrouz A Forouzan “Cryptography and Network Security” McGraw Hill, Special Indian edition