Vol. 35, No. 3, September 2003 | SANDRO RAFAELI AND DAVID HUTCHISON
The paper "A Survey of Key Management for Secure Group Communication" by Sandro Rafaeli and David Hutchison from Lancaster University provides an overview of key management techniques for secure group communication. The authors discuss the challenges of controlling access to transmitted data in IP multicast and the need for encryption to protect messages among group members. They categorize key management approaches into three main classes: centralized group key management protocols, decentralized architectures, and distributed key management protocols. The paper then delves into each category, analyzing their features, goals, and solutions. Centralized protocols aim to minimize storage requirements, computational power, and bandwidth utilization, while decentralized architectures divide management among subgroup managers to reduce concentration of work. Distributed key management protocols do not rely on a central controller, with members generating keys either individually or collaboratively. The authors compare various protocols based on criteria such as backward and forward secrecy, message size, and computational requirements. They also discuss specific protocols like GKMP, Logical Key Hierarchy (LKH), One-way Function Tree (OFT), and Efficient Large-Group Key (ELK), highlighting their strengths and weaknesses. The paper concludes with a summary of decentralized architectures and distributed key management approaches, emphasizing the trade-offs between security, scalability, and efficiency.The paper "A Survey of Key Management for Secure Group Communication" by Sandro Rafaeli and David Hutchison from Lancaster University provides an overview of key management techniques for secure group communication. The authors discuss the challenges of controlling access to transmitted data in IP multicast and the need for encryption to protect messages among group members. They categorize key management approaches into three main classes: centralized group key management protocols, decentralized architectures, and distributed key management protocols. The paper then delves into each category, analyzing their features, goals, and solutions. Centralized protocols aim to minimize storage requirements, computational power, and bandwidth utilization, while decentralized architectures divide management among subgroup managers to reduce concentration of work. Distributed key management protocols do not rely on a central controller, with members generating keys either individually or collaboratively. The authors compare various protocols based on criteria such as backward and forward secrecy, message size, and computational requirements. They also discuss specific protocols like GKMP, Logical Key Hierarchy (LKH), One-way Function Tree (OFT), and Efficient Large-Group Key (ELK), highlighting their strengths and weaknesses. The paper concludes with a summary of decentralized architectures and distributed key management approaches, emphasizing the trade-offs between security, scalability, and efficiency.