Abstract

In group key management, the implementation of encryption often fails because multicast communication does not provide reliable linkage. In this paper, a new group key management scheme is proposed for multicast communication in fog computing networks. In the proposed scheme, any legal fog user belonging to a fog node will be able to decrypt a ciphertext encrypted by a secret shared key. The shared secret key is divided into key segments. In the rekeying operation process, each key segment is split into two factors with its shared production mechanism. The key updates are required to belong to the fog provider or the group management device. Fog users will have independent key segments unchanged. Then, the cost, the message of rekeying, and the dependence on credible channels will be decreased. This method can resist collusion attacks and ensure backward security and forward security, even if the number of users leaving is larger than the threshold value. Our scheme is also suitable for untrusted affiliate networks.

Highlights

  • Multicast communication technology is important for different network applications [1,2], especially for wireless networks

  • Multicast communication technology has been used in network video, online e-sports, and real-time online conferences, which gets to be susceptible to different security assaults, e.g., refusal of service, eavesdropping, and attacks to capture the physical nodes [3]

  • In Gι, key management center performs scalar multiplication id + (n + 1)(KD − 1) for a joining FUn+1 and the key segments are updated for members with n + 1 messages cost, or scalar multiplication id + (n − 1)(KD − 1) for a leaving FUn and the key segments are updated for members with the cost given by n–1 messages

Read more

Summary

Introduction

Multicast communication technology is important for different network applications [1,2], especially for wireless networks. A secure key management scheme is proposed for fog computing services in [17]. In [20], to ensure secure communication between a group of fog nodes and clouds, the authors have designed a key exchange scheme as an attribute-based encryption scheme. The updated members have the rekeying tasks, and the computing costs are related to the scale of the networks, as given the autonomic group key management in deep space DTN (AGKM) in [33], and the autonomous shared key management scheme for space networks (AKMSN) [34]. Group key management has an important target to improve efficiency that decreases delay time, resource overheads, and scale in rekeying operations. We try to a group key management scheme for multicast communication fog computing networks, named GKMSFC.

Fog Network
Security Requirements
Bilinear Pairings
Threshold Cryptography
Shared Secret Product
Group Key Management Scheme in Fog Computing Network
Initialization Stage
Encryption Stage
Decryption Stage
Rekeying Stage
Security Analysis
Adjusting
Security
Collusion Attack
Computation Overhead
Rekeying Efficiency
Scalability
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call