Monday 19 October 2015

A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast



Abstract
Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that are possible to co-exist within a single network, mobile subscribers could subscribe to these services concurrently while ubiquitous. However, the existing group key management (GKM) protocols intend to secure group communication for just a single group service. The GKM approaches involve inefficient use of keys and huge rekeying overheads, hence unsuitable for multiple multicast group environments. In this paper, we propose a novel GKM protocol for multiple multicast groups, called slot based multiple group key management (SMGKM) scheme. SMGKM supports the movement of single and multiple members across a homogeneous or heterogeneous wireless network while participating in multiple group services with minimized rekeying transmission overheads. Unlike conventional GKM protocols, SMGKM protocol can mitigate one-affect-n phenomenon, single point of failure and investment pressure of signaling load caused by rekeying at the core network. Numerical analysis and simulation results of the proposed protocol show significant resource economy in terms of communication bandwidth overhead, storage overheads at the Domain Key Distributor (DKD), mobile receiver and Area Key Distributors while providing intense security.
Aim
The aim is to improve the key management performance in the presence of multi-moves participating in multi-group services.
Scope
SMGKM used a new rekeying strategy based on lightweight KUS and SKDL for effectively performing key management and authentication phases respectively during handoff. SMGKM adopted independent TEK per cluster to localize rekeying and mitigate one-affect-n phenomenon.
Existing System
Traditional GKM protocols addressing rekeying over wired networks are divided in to centralized, decentralized and contributory schemes. Centralized schemes rely on the centralized server known as the Domain Key Distributor (DKD) for generation and distribution of encryption keys. Contributory scheme has no explicit DKD, thus group members collaborate for group key establishment. Decentralized schemes partition the group into subgroups each managed by subgroup managers in order to equally distribute the key management tasks hence scalability. Work in further categorizes the GKM as common TEK and Independent TEK per subgroup approaches depending on how the TEK is distributed in the framework. Common TEK approaches utilize one TEK for all group members and commonly suffer from one-affect-n phenomenon; thus rekeying of the new TEK affect all the members subscribed to the same group in the entire network whenever a membership change occurs. Independent TEK per subgroup approaches try to alleviate the one-affect-n phenomenon caused by common TEK approaches, by enabling each subgroup to independently manage its own TEK, thus rekeying of the new TEK is localized within the affected subgroup during membership change. However the GKM protocols did not consider host mobility during their implementation though they cannot be extended to wireless mobile environment directly. In order to address rekeying in wireless mobile environment, few GKM protocols have been proposed recently. In addition to dynamic membership change considered for GKM protocols in wired networks, these protocols consider dynamic location change of members over a widely distributed wireless network while seamlessly receiving subscribed multicast services securely. The protocols adopt a decentralized framework for scalability, categorized them according to common TEK and Independent TEK per subgroup approaches addressing similar rekeying issues.
Disadvantages
However, none of the GKM schemes address rekeying for multiple group services. Various rekeying strategies consider a single multicast service. In SMGKM the key management tasks are offloaded to the intermediate cluster managers called Area Key Distributors (AKD) which establish the necessary key management keys. SMGKM integrate our concept of session key distribution list (SKDL) introduced for fast and secure authenticated handover along with initial key establishment. SMGKM employ a lighter symmetric encryption suitable for resource constraint mobile devices than heavier asymmetric effort. Compared to the existing schemes, SMKGM save enormous communication bandwidth utilization in the presence of multi-handoffs in multi-services.
Proposed System
We propose a novel key management rekeying strategy, not realized in the design of conventional approaches to address security for multi-service groups subscribed by multi-users. However, this paper only considers dynamic member location change of mobile hosts subscribed to multiple subscriptions without considering dynamic membership change which is also applicable.
Advantages
A new SMGKM scheme has been proposed to improve the key management performance in the presence of multi-moves participating in multi-group services. It considered providing backward confidentiality where mobile receivers dynamically perform handoff while seamlessly maintaining diverse subscriptions. In contrast to convectional schemes targeted for a single service, SMGKM used a new rekeying strategy based on lightweight KUS and SKDL for effectively performing key management and authentication phases respectively during handoff. SMGKM adopted independent TEK per cluster to localize rekeying and mitigate one-affect-n phenomenon. By offloading the key management and authentication phases to the intermediate AKDs massively reduced signalling load at the core network than in convectional schemes hence giving DKD scalability while preventing bottlenecks. The SMGKM analytical model was developed for two rekeying approaches: pairwise and LKH. Numerical analysis and simulation results of the SMGKM performed much better using both rekeying approaches in comparison to previous work. Thus SMGKM have shown significant resource economy in terms of communication bandwidth overhead, storage overheads at the DKD, AKD, and the mobile receiver while providing intense security. Finally, the analytical study was explored by simulation for solving the bandwidth optimization problem in SMGKM which showed efficiency in bandwidth consumption in the presence of multi-services. However, SMGKM is expected to become a practical dynamic solution for securely and efficiently managing multi-services which can be received concurently by huge mobile subscribers in the future wireless networks such as emerging Software- Defined Networks.

SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·       Processor  -   Pentium –III

·      Speed            -    1.1 Ghz
·      RAM             -    256 MB(min)
·      Hard Disk              -   20 GB
·      Floppy Drive         -    1.44 MB
·      Key Board             -    Standard Windows Keyboard
·      Mouse           -    Two or Three Button Mouse
·      Monitor                 -    SVGA

SOFTWARE REQUIREMENTS:-

·      Operating System          : Windows  7                                  
·      Front End                      : JSP AND SERVLET
·      Database                       : MYSQL
References
Shepherd SJ, Abd - Alhameed RA “A NEW MULTIPLE SERVICE KEY MANAGEMENT SCHEME FOR SECURE WIRELESS MOBILE MULTICAST” Mobile Computing, IEEE Transactions on (Volume: 14, Issue: 8 ) October 2014.

No comments:

Post a Comment