Received 28 February 2005
Copyright © 2006 John Wiley & Sons, Ltd. Accepted 18 April 2005
Scalable and fault-tolerant key agreement protocol
for dynamic groups
A. Abdel-Hafez
1
, A. Miri
1
and L. Orozco-Barbosa
2,
*
,†
1
School of Information Technology & Engineering, University of Ottawa, Ottawa, Ontario, Canada.
2
Instituto de Investigación en Informatica, Universidad de Castilla-La Mancha, Albacete, Spain.
SUMMARY
With the widespread use of the Internet, the popularity of group communication-based applications has grown con-
siderably. Since most communications over the Internet involve the traversal of insecure networks, basic security ser-
vices are necessary for these collaborative applications. These security services can be facilitated if the authorized group
members share a common secret. In such distributed applications, key agreement protocols are preferred to key dis-
tribution protocols. In the past two decades, there have been many proposals for key agreement protocols. Most of these
protocols are not efficient and limit the size of the underlying group. In this paper, we consider the scalability problem
in group key agreement protocols. We propose a novel framework based on extension of the Diffie–Hellman key
exchange protocol. The efficiency of our protocol comes from the clustering of the group members, where the common
session key is established collaboratively by all participants. We present the auxiliary protocols needed when the mem-
bership changes. We show that our protocol is superior in complexity in both communication and computation over-
heads required to generate the session key. Copyright © 2006 John Wiley & Sons, Ltd.
1. INTRODUCTION
With the widespread use of the Internet, the popularity of group communication- based applications has
grown considerably. Group communication is a means of providing multi-point to multi-point commu-
nication by organizing processes in groups. Current group-oriented applications include live multi-party
conferences, online video games, collaborative workspaces, remote consultation and diagnosis systems
for medical applications, contract negotiation and distributed interactive simulation and much more.
Many of these applications disseminate and exchange sensitive and/or classified information. In prac-
tice most of these applications use the Internet as the underlying communications network, so basic secu-
rity services—such as traffic integrity, entity authentication, and confiden-tiality—are necessary for these
collaborative applications.
These security services can be facilitated if the authorized group members share a common secret
(known in the literature as a group or session key. Thus one of the main design challenges in secure and
reliable group communication systems is the group key management. A key management protocol is a
process whereby a shared secret key becomes available to two or more authorized parties, for subsequent
cryptographic use. Key management protocols can be subdivided broadly into:
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT
Int. J. Network Mgmt 2006; 16: 185–201
Published online 9 February 2006 in Wiley InterScience
(www.interscience.wiley.com) DOI: 10.1002/nem.592
*Correspondence to: L. Orozco-Barbosa, Instituto de Investigación en Informática, Universidad de Castilla–La Mancha, Campus
Universitavio s/n, 02071 Albacete, Spain.
†
E-mail: luis.orozco@uclm.es
Contract/grant sponsor: NSERC.
Contract/grant sponsor: Council of Science and Technology of Castilla–La Mancha; contract/grant number: PBC-03-001.