Fast
Transmission to Remote Cooperative Groups: A New Key Management Paradigm
ABSTRACT:
The problem of
efficiently and securely broadcasting to a remote cooperative group occurs in
many newly emerging networks. A major challenge in devising such systems is to
overcome the obstacles of the potentially limited communication from the group
to the sender, the unavailability of a fully trusted key generation center, and
the dynamics of the sender. The existing key management paradigms cannot deal
with these challenges effectively. In this paper, we circumvent these obstacles
and close this gap by proposing a novel key management paradigm. The new
paradigm is a hybrid of traditional broadcast encryption and group key
agreement. In such a system, each member maintains a single public/secret key
pair. Upon seeing the public keys of the members, a remote sender can securely
broadcast to any intended subgroup chosen in an ad hoc way. Following
this model, we instantiate a scheme that is proven secure in the standard model.
Even if all the non-intended members collude, they cannot extract any useful
information from the transmitted messages. After the public group encryption
key is extracted, both the computation overhead and the communication cost are
independent of the group size. Furthermore, our scheme facilitates simple yet
efficient member deletion/ addition and flexible rekeying strategies. Its
strong security against collusion, its constant overhead, and its
implementation friendliness without relying on a fully trusted authority render
our protocol a very promising solution to many applications.
EXISTING SYSTEM:
WMNs have been recently suggested as a promising
low-cost approach to provide last-mile high-speed Internet access. A typical
WMN is a multihop hierarchical wireless network. The top layer consists of
high-speed wired Internet entry points. The second layer is made up of
stationary mesh routers serving as a multihop backbone to connect to each other
and Internet via long-range high-speed wireless techniques. The bottom layer
includes a large number of mobile network users. The end-users access the
network either by a direct wireless link or through a chain of other peer users
leading to a nearby mesh router; the router further connects to remote users
through the wireless backbone and Internet. Security and privacy issues are of
utmost concern in pushing the success of WMNs for their wide deployment and for
supporting service-oriented applications. For instance, a manager on his way to
holiday may want to send a confidential e-mail to some staff of her company via
WMNs, so that the intended staff members can read the e-mail with their mobile
devices (laptops, PDAs, smart phones, etc.). Due to the intrinsically open and
distributed nature of WMNs, it is essential to enforce access control of
sensitive information to cope with both eavesdroppers and malicious attackers.
DISADVANTAGES
OF EXISTING SYSTEM:
A major challenge in devising such systems is to
overcome the obstacles of the potentially limited communication from the group
to the sender, the unavailability of a fully trusted key generation center, and
the dynamics of the sender. The existing key management paradigms cannot deal
with these challenges effectively.
PROPOSED SYSTEM:
Our contribution includes three aspects. First, we
formalize the problem of secure transmission to remote cooperative groups, in
which the core is to establish a one-to-many channel securely and efficiently
under certain constraints.
Second, we propose a new key management paradigm
allowing secure and efficient transmissions to remote cooperative groups by
effectively exploiting the mitigating features and circumventing the
constraints discussed above. The new approach is a hybrid of group key
agreement and public-key broadcast encryption.
Third, we present a provably secure protocol in the
new key management paradigm and perform extensive experiments in the context of
mobile ad hoc networks. In the proposed protocol after extraction of the public
group encryption key in the first run, the subsequent encryption by the sender
and the decryption by each receiver are both of constant complexity, even in the
case of member changes or system updates for rekeying.
ADVANTAGES
OF PROPOSED SYSTEM:
The common problem is to enable a sender to securely
transmit messages to a remote cooperative group. A solution to this problem
must meet several constraints.
·
First, the sender is remote and can be
dynamic.
·
Second, the transmission may cross
various networks including open insecure networks before reaching the intended
recipients.
·
Third, the communication from the group
members to the sender may be limited. Also, the sender may wish to choose only
a subset of the group as the intended recipients.
·
Furthermore, it is hard to resort to a fully
trusted third party to secure the communication. In contrast to the above
constraints, mitigating features are that the group members are cooperative and
the communication among them is local and efficient.
MODULES:
Network Environment Setup Module
Certificate Authority Module
Key Broadcast Module
Group Key management
Adding
Key
Deleting
Key
Rekeying
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard Disk -
20 GB
ü Key Board -
Standard Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System : Windows XP
ü Programming Language :
JAVA
ü Java Version :
JDK 1.6 & above.
REFERENCE:
Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Josep
Domingo-Ferrer, Fellow, IEEE, and Jesús A. Manjón “Fast Transmission to Remote
Cooperative Groups: A New Key Management Paradigm”- IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013.