CAKE: An Efficient Group Key Management for Dynamic Groups

by   Peter Hillmann, et al.

With rapid increase of mobile computing and wireless network linkage, the information exchange between connected systems and within groups increases heavily. Exchanging confidential information within groups via unsecured communication channels is a high security threat. In order to prevent third parties from accessing this data, it is essential to encrypt it. For this purpose, the group participants need a common group key to enable encrypted broadcast messages. But efficient key management of secured group communication is a challenging task, if participants rely on low performance hardware and small bandwidth. For coordination and distribution, we present the modular group key management procedure CAKE that is centrally organized and meets strict security requirements. The lightweight G-IKEv2 protocol in combination with the key exchange concept of CAKE leads to an efficiently integrated solution. The hybrid approach combines the advantages of the existing protocols with the objective to reduce the computation and communication effort. It is shown that the procedure is more suitable for changing MANET groups than the existing ones. Moreover, the exchanged group key can be used for any services which provides a wide range of applications.



There are no comments yet.


page 1

page 2

page 3

page 4


Cryptographic multilinear maps using pro-p groups

To any nilpotent group of class n, one can associate a non-interactive k...

Commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups as bases of new Key Exchange Protocol

The goal of this investigation is effective method of key exchange which...

A diagrammatic approach to information flow in encrypted communication (extended version)

We give diagrammatic tools to reason about information flow within encry...

Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF

Secure group-oriented communication is crucial to a wide range of applic...

Public key cryptography based on twisted dihedral group algebras

In this paper, we propose to use a twisted dihedral group algebra for pu...

How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure

Two recent papers describe almost exactly the same group key establishme...

Interest-Aware Delivery for Mobile Social Networks: A TRACE-driven Approach

We envision future mobile networks to be human-centric supporting intere...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.