slide 1 comparison of inter-area rekeying algorithms for secure mobile group communication c....

Post on 24-Dec-2015

215 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

slide 1

Comparison of Inter-Area Rekeying Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Algorithms for Secure Mobile Group

CommunicationCommunication

C. Zhang*, B. DeCleene+, J. Kurose*, D. Towsley*

* Dept. Computer Science University of Massachusetts/Amherst Amherst MA USA

+ ALPHATECH Burlington MA USA

Performance 2002 in Rome

slide 2

Overview

introduction: hierarchical key management in a mobile environment

four key management algorithmsperformance modelsresultssummary

slide 3

Scenario: many mobile nodes requiring encrypted communication symmetric data key used for encryption rekey when member joins domain (backward confidentiality) rekey when member leaves domain (forward confidentiality)

Scalable, Secure Group Management

Q: How to perform scalable rekeying given mobility?

DKD

… …

AKD 1 AKD 3 AKD 7 AKD 8

slide 4

AKD 1 AKD 3 AKD 7 AKD 8

Efficient, scalable, secure group management

Hierarchical key distribution: domain divided into areas area key distributor (AKD) distributes data key within area per-area key to encrypt rekeying within area exploit multicast communication within area

DKD

… …

transferleavejoin

Q: key management given mobility in/out/among areas

slide 5

Overview

introduction: hierarchical key distribution in a mobile environment

four key management algorithmsperformance modelsresultssummary and future work

slide 6

SR: Static Rekeying

inter-AS communication during rekeying: inter-AS multicast

AKD AKD

Static (SR)

node always belongs to same area

move

data key

AS 1 AS 2

performance degradation: multiple data keys sent to an AS ( …)

slide 7

BR: Baseline Rekeying

Baseline Rekeying (BR) AS = area move between ASs = transition between areas

AKD AKD

join

transfer

leave

data key

AS 2AS 1

inter-area-transfer implemented as domain leave/join domain leave: area key rekey, data key rekey domain join : area key rekey, data key rekey

slide 8

IR: Immediate Rekeying

Immediate Rekeying (IR) no data key rekeying during transition area keys ( ) are rekeyed

credentials passed between AKDs to implement transfer of security relationship

AKD AKD data key

AS 2AS 1

join

transfer

leave

slide 9

FEDRP: First Entry Delayed Rekey (Periodic)

First Entry Delayed Rekey (FEDRP)area key rekeyed only on first entry to area and domain

leave holding the area key

AKD AKDdata key

AS 2AS 1

transfer

periodic rekey (optional): bound outside member area key holding time

no area key rekey for visit other than 1st time

no area key rekeying when transferring outmobile holds area keys while moving within domain

slide 10

Overview

introduction: hierarchical key distribution in a mobile environment

four key management algorithmsperformance modelsresultssummary and future work

slide 11

Analysis Overview

Performance metrics:communication:

key-related msg rate within AS i

key-related msg rate out of AS i

computation: area key rekey rate

security: #(area keys) held by area member

Modeling approach:

M areas Poisson arrivals () of

new members to domain exponential sojourn

time within AS inter-AS member

mobility: Markov process

slide 12

Analysis Details model each AS as M/M/∞ queue

1/i (i {1,…,M}) : average sojourn time in AS i per visit

state i (i {1,…,M}) : inside domain, in AS i state M+1: outside domain

P = [pi,j] (i,j {1,…,M+1}) : state transition probability

= [i ] (i {1,…,M}) : area key periodic rekey interval (FEDRP)

compute occupancy probabilities for AS i

achieve performance metric of interest

slide 13

Analysis Summary:

SR, BR, IRclosed form solutions

FEDRPfurther assumptions needed: (domain leave

and period rekey) area rekeying is Poissonsolved as a fixed point problem

validated by DaSSF simulator

slide 14

Overview

introduction: hierarchical key distribution in a mobile environment

four key management algorithmsperformance modelsresultssummary

slide 15

100

1000

10000

100000

1 10 100 1000

avg #ASs visited per member

msg

ra

te w

ith

in A

S i

SRBRIRFEDRP 1/δ=0FEDRP 1/δ=100FEDRP 1/δ=1000

Message Rate within an AS

FEDRP(1/δ=0): smallest msg rate, except with high mobility

M=16, =100, 1/ = 1, HOMOGEMEOUS

10m

100m

1kmFoot Urban HWY

Foot Urban HWY

Foot Urban

slide 16

Message Rate out of an AS

SR: higher inter-AS communication

0

50

100

150

200

250

1 10 100

avg #ASs visited per member

msg

ra

te o

ut

of

AS i

SR

FEDRP

slide 17

Area Key Rekey Rate

FEDRP: rekey rate bounded by 2+1/i

1

10

100

1000

10000

1 10 100 1000

avg #ASs visited per member

area

key

rek

ey r

ate

of a

rea

i

SR BR,IRFEDRP 1/δ=0 FEDRP 1/δ=100FEDRP 1/δ=1000

1200=2*100+1000

300=2*100+100

200=2*100+0

slide 18

Average #Area Keys held by a member

FEDRP: # area keys held small except with high mobility

1

1.5

2

2.5

3

3.5

4

1 10 100

avg #ASs visited per member

av

g #

are

a k

eys

hel

d b

y a

mem

ber

FEDRP 1/δ=0

FEDRP 1/δ=100

FEDRP 1/δ=1000

slide 19

10

100

1000

10000

1 10 100

avg #ASs visited per member

area

rek

ey r

ate

of a

rea

i

IR AIR BIR CFEDRP 1/δ=0 AFEDRP 1/δ=0 BFEDRP 1/δ=0 C

• same trend as homogeneous case• small difference among areas

Heterogeneous Case : 2D Random Walk

thus far: “transporter” mobility model - member can move directly from any AS to any other AS

2D random walk: only move to neighboring AS

IR

FEDRP

A B

B C

B A

C B

B C

A B

C B

B A

slide 20

Summary

performance analysis of four inter-area rekey algorithms addressing the mobility issue

analytic performance models modeling heterogeneous mobility such as “2D random walk” FEDRP has lowest communication costs, and low

computation costs FEDRP allows to hold small number of area keys SR performs better in highly mobile scenarios

cost: higher inter-AS communication

slide 21

Thanks

slide 22

Applications

large scale military

law enforcement

disaster recovery

business

slide 23

Future Work

data throughput

impact of loss and latency

authentication overhead

effect of LKH

slide 24

Thanks

top related