Secure Group Communication based on Elliptic Curve Cryptography

  • Manisha Manjul Gautam Buddha University
  • Rajesh Mishra GBU, Greatyer Noida


Group key management is an important functional building block for any secure multicast architecture. In this regards, it is identified some security issues in the group key management when a user join or leave the group then forward secrecy and backward secrecy issues comes in the multicast networks. This paper provides an efficient and improve mechanism for group key management solutions with computational and communication overhead are less while rekeying cost also minimize

Author Biographies

Manisha Manjul, Gautam Buddha University

School of ICT, Greater Noida

Rajesh Mishra, GBU, Greatyer Noida
School of ICT


R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, and R. Dharmaraj” Secure Group Key Management Scheme for Multicast Networks”, International Journal of Network Security, Vol.11, No.1, PP.33-38, July 2010.

S.Jabeenbegum , Dr.T.Purusothaman , Karthi.M, Balachandar.N, Arunkumar.N “An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.2, February 2010.

Chung Kei Wong, Mohamed Gouda, and Simon S. Lam,“Secure Group Communications Using Key Graphs”,IEEE/ACM Transactions on Networking, Vol. 8, NO. 1,February 2000.

Shanyu Zheng, David Manz, Jim Alves-Foss, “A Communication Computation Efficient Group Key Algorithm for Large and Dynamic Groups”, Elsevier, Computer Networks, March 2006.

Marimuthu Rajaram and Thilagavathy Dorairaj Suresh” An Interval-based Contributory Key Agreement” International Journal of Network Security, Vol.13, No.2, PP.92-97, Sept. 2011

Paul Judge and Mostafa Ammar,” Security Issues and Solutions in Multicast Content Distribution: A Survey”, IEEE Network, January/February 2003.

Yacine Challal, Hamida Seba,” Group Key Management Protocols: A Novel Taxonomy”, International Journal of Information Technology Volume 2 Number 1 2005 Issn: 1305-2403.

Donghyun Choi, Sungjin Lee, Dongho Won, Seungjoo Kim” Efficient Secure Group Communications for SCADA”, IEEE Transactions On PoAuthorr Delivery, Vol. 25, No. 2, April 2010.

M. Baugher, R. Canetti, L. Dondeti, F. Lindholm “Multicast Security (MSEC) Group Key Management Architecture”RFC 4046, April 2005.

Imane Aly Saroit, Said Fathy El-Zoghdy, and Mostafa Matar,” A Scalable and Distributed Security Protocol for Multicast Communications”, International Journal of Network Security, Vol.12, No.2, PP.61-74, Mar. 2011.

Said Gharout, Yacine Challal, and Abdelmadjid Bouabdallah” Scalable Delay-constrained Multicast Group Key Management”, International Journal of Network Security, Vol.7, No.2, PP.142-156, Sept. 2008.

T. Hardjono and B. Cain, “Key Establishment for IGMP Authentication in IP Multicast,” IEEE ECUMN, CREF, Colmar, France, 2000.

A. Ballardie and J. Crowcroft,”Multicast-Specific Security Threats and Countermeasures, “ Proc. ISOC Symp. Network and Distributed System Security, San Diego, CA, pp. 2-16, Feb. 1995.

P. Q. Judge and M. H. Ammar, “Gothic: Group Access Control Architecture for Secure Multicast and Anycast,” IEEE INFOCOM, July 2002.

R. Gennaro and P. Rohatgi, “How to Sign Digital

Streams,” LNCS, vol. 1294, 1997.

C. Wong and S. Lam, “Digital Signatures for Flows and Multicasts,” IEEE/ACM Transaction Network, vol. 7, 1999.

P. Golle and N. Modadugu, “Authenticating Streamed Data in the Presence of Random Packet Loss,” Network and Distributed System Security Symp., 2001.

P. Rohatgi,“A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,” ACM Conference Computer and Communication Security, Nov. 1999.

H. Chu, L. Qiao, and K. Nahrstedt, “A Secure Multicast Protocol with Copyright Protection,” Proc. IS&T/SPIE’s Symp. Electronic Imaging: Science and Technoogy, Jan. 1999.

I. Brown, C. Perkins, and J. Crowcroft, “Watercasting: Distributed Watermarking of Multicast Media,” Networked Group Communication ‘99, Pisa, Italy, pp. 286-300, Nov. 1999

T. Wu and S. Wu, “Selective Encryption and Watermarking of mpeg Video,” technical report, NC State Univ.

P. Q. Judge and M. H. Ammar, “WHIM: Watermarking Multicast Video with a Hierarchy of Intermediaries,” Proc. NOSSDAV, Chapel Hill, NC, June 2000.

D. Wallner, E. Harder and R. Agee,” Key Management for Multicast: Issues and Architecture”. National Security Agency, June 1999. RFC2627.

Chung Kei Wong, Mohamed Gouda, and Simon S. Lam,“Secure Group Communications Using Key Graphs”,IEEE/ACM Transactions on Networking, Vol. 8, NO. 1, February 2000.

Shanyu Zheng, David Manz, Jim Alves-Foss,“A communication computation efficient group key algorithm for large and dynamic groups” Elsevier, Computer Networks, Volume 51, Issue 1, Pages 69-93, 17 January 2007.

Riham Abdellatif, Heba K. Aslan, and Salwa H. Elramly” New Real Time Multicast Authentication Protocol” International Journal of Network Security, Vol.12, No.1, PP.13-20, Jan. 2011.

Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, and Heba K. Aslan” A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach” International Journal of Network Security, Vol.8, No.1, PP.75–89, Jan. 2009.

Yang Richard Yang, X. Steve Li, X. Brian Zhang, Simon S. Lam” Reliable Group Rekeying: A Performance Analysis” SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, August 2001.

Alireza Nemaney Pour , Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh” A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation” Elsevier, Computer Networks, Volume 51, Issue 17, Pages 4727-47435 December 2007.

Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah” SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications” ACM SIGCOMM Computer Communications Review, Volume 34, Number 2: April 2004.

David Manz, Jim Alves-Foss and Shanyu Zheng” Network Simulation of Group Key Management Protocols” Journal of Information Assurance and Security, Volume 3, Issue 1, 67-79, january2008.

Sandro Rafaeli and David Hutchison” A Survey of Key Management for Secure Group Communication” ACM Computing Surveys, September2003.

Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau” Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups” IEEE/ACM Transactions on Networking, Vol. 14, No. 2, April 2006.

Yan (Lindsay) Sun, K. J. Ray Liu” Hierarchical Group Access Control for Secure Multicast Communications” IEEE/ACM Transactions on Networking, Vol. 15, No. 6, December 2007.

Kin-Ching Chan and S.-H. Gary Chan,” Key Management Approaches to Offer Data Confidentiality for Secure Multicast” IEEE Network, September/October 2003.

Dong-Hyun Je, Jun-Sik Lee , Yongsuk Park , Seung-Woo Seo” Computation-and-storage-efficient key tree management protocol for secure multicast communications,” ELSEVIER, Computer Communications ,vol.33, Issue 2, pages 136-

,Febuary 2010.

Xiaoyan Chen, Bobby N.W. Ma, Cungang Yang” M-CLIQUES: Modified CLIQUES key agreement for secure multicast,” Computers & Security, Volume 26, Issue 3, Pages 238-245, May 2007.

Yu Fang Chung, Hsiu Hui Lee, Feipei Lai, Tzer Shyong Chen,” Access control in user hierarchy based on elliptic curve crypto system,” Science Direct Information Sciences,vol.178,2008 .

K.Kumar, Dr.V.Sumathy and J.Nafeesa Begum” Efficient Region-Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography,” Advance Computing Conference, IACC2009. IEEE International, March 2009.

A. Ballardie. “Scalable Multicast Key Distribution,” May 1996. RFC 1949.

B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. “Secure group communications for wireless networks”. MILCOM, June 2001.

T. Hardjono, B. Cain, and I. Monga.” Intra-domain Group Key Management for Multicast Security,” IETF Internet draft, September 2000.

I. Ingemarson, D. Tang, and C. Wong. “A Conference Key Distribution System,” IEEE Transactions on Information Theory, 28(5):714–720, September 1982.

W.Diffie and M.E.Hellman. “New directions in cryptography” IEEE Transactions on Information Theory, IT-22:644–654, November 1976.

R. Canetti, “Multicast Security: A Taxonomy and Efficient Constructions,“ IEEE INFOCOM, New York, Mar. 1999.

A. Perrig, “Efficient and Secure Source Authentication for Multicast,” Network and Distributed System Security Symp., Feb. 2001.

Wee Hock Desmond Ng, Michael Howarth, Zhili Sun, and Haitham Cruickshank,”Dynamic Balanced Key Tree Management for Secure Multicast Communications,” IEEE Transactions on Computers, VOL. 56, Page 590 - 605, MAY 2007.

Haibin Lu,” A Novel High-Order Tree for Secure Multicast Key Management,” IEEE Transactions on Computers, VOL. 54, Pages: 214 - 224, February 2005.

Xinliang Zheng, Chin-Tser Huang, Manton Matthews” Chinese Remainder Theorem Based Group Key Management,” Proceedings of the 45th annual southeast regional conference, March 2007.

William Stallings” Cryptography and Network Security Principles and Practices,” Fourth Edition, Pages: 592, November 16, 2005.

D. Cheriton and S. Deering, “Host Groups: A Multicast Extension for Datagram Internetworks,” Data Commun. Symp., Sept. 1985, pp. 172-79.

C.K. Wong, Mohamed Gouda, and Simon S. Lam, “Secure group communications using key graphs”, IEEE/ACM Transactions on Networking. 8 (1) (February 2000) 16–30.

D. Wallner, E. Harder, R. Agee”, Key Management for Multicast: Issues and architectures”, National Security Agency, RFC2627 (June 1999).

T. Dierks, E. Rescorla, “The Transport Layer Security (TLS)” Protocol Version 1.1, RFC2346 (April 2006).

Douglas R. Stinson, “Cryptography Theory and Practice”, Second edition, Chapman and Hall/CRC Press, 2002, pp. 155–

C. Rigney, S. Willens, A. Rubens, W. Simpson, “Remote Authentication Dial in User Service (RADIUS),” RFC 2865, June 2000.

S. Deering “Host Extensions for IP Multicasting,” RFC 1112, August 1989.

D. Waitzman, C. Partridge, S. Deering,” Distance Vector Multicast Routing Protocol,” RFC 1075, November 1988.

J. Moy,” Multicast Open Shortest Path First (MOSPF), “RFC 1583, march 1994.

D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, L. Wei,” Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification,” RFC 2362, June 1998.

T. Pusateri,” Distance Vector Multicast Routing Protocol v3,” RFC 1075, August 2000.

A. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2009

Diot, C., et al., ‘‘Deployment Issues for the IP Multicast Service and Architecture,’’ IEEE Network, Special Issue on Multicasting, January/February 2000.

How to Cite
Manjul, M., & Mishra, R. (2014). Secure Group Communication based on Elliptic Curve Cryptography. Transactions on Networks and Communications, 2(1), 1-26.