Trust based Clustering for Group Key Management · Microsoft PowerPoint -...

15
Laboratoire d'InfoRmatique en Image et Systèmes d'information LIRIS UMR 5205 CNRS/INSA de Lyon/Université Claude Bernard Lyon 1/Université Lumière Lyon 2/Ecole Centrale de Lyon http://liris.cnrs.fr Trust based Clustering for Group Trust based Clustering for Group Key Management Key Management Trust based Clustering for Group Trust based Clustering for Group Key Management Key Management Hamida SEBA Graphs, Algorithms and Applications

Transcript of Trust based Clustering for Group Key Management · Microsoft PowerPoint -...

Page 1: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Laboratoire d'InfoRmatique en Image et Systèmes d'informationLIRIS UMR 5205 CNRS/INSA de Lyon/Université Claude Bernard Lyon 1/Université Lumière Lyon 2/Ecole Centrale de Lyon

http://liris.cnrs.fr

Trust based Clustering for Group Trust based Clustering for Group Key ManagementKey Management

Trust based Clustering for Group Trust based Clustering for Group Key ManagementKey Management

Hamida SEBA Graphs, Algorithms and Applications

Page 2: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 2

In this talk:In this talk:

Group based applications

Security of Group communication

Group key management

Trust based clustering for group key management

Page 3: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

Group based applicationsGroup based applications

3

Teleconferencing Collaborative work Replicated databases

Distributed interactive simulation E-learning Etc.

ProcessWeb serviceAgentEnd user

applicationEtc.

Page 4: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 4

Security of Group CommunicationSecurity of Group Communication

Prevention

ConfidentialityAuthentication

IntegrityNon-repudiation

Page 5: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

5Hamida SEBA

ConfidentialityConfidentiality-- Key ManagementKey Management

Solution= Encryption

Symmetric Key : shared between the sender and the receivers.

This key is called : the group key

Main issue : how to compute and distribute keys?

Page 6: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

GROUP KEY MANAGEMENTGROUP KEY MANAGEMENT GROUP KEY: a secret quantity known only to current group

members

BACKWARD SECRECY Any subset of group keys cannot be used to discover previous group

keys

FORWARD SECRECY Any subset of group keys cannot be used to discover subsequent keys

THE GROUP KEY MANAGEMENT PROTOCOL MUST UPDATE THE GROUP KEY (REKEY)

A new group member cannot read data exchangedbefore he joins the group

An excluded member cannot read data exchangedafter he leaves the group

6

Page 7: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

MODELS OF GROUP KEYS (1)MODELS OF GROUP KEYS (1)

GROUP KEY DISTRIBUTION One party generates a secret key and distributes it to others

Group member

No key generationGroup member

Does key generationKey node

Pairwise modelHierarchical model

(tree of members or third parties

Page 8: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

MODELS OF GROUP KEYS (2)MODELS OF GROUP KEYS (2)

GROUP KEY AGREEMENT Secret key is derived jointly by two or more parties Key is a function of information contributed by each member No party can pre-determine the result

Group member

Does key generation

Distributed Tree of keys

(maintained by each member)

No pre-determined structure Key node

Page 9: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 9

Group Key computation: an exampleProtocole de Perrig et al.,2000

2,1bk 4,3bk

pgclé NNNN gg mod4321

pgk NN mod212,1 pgk NN mod43

4,3

N1N2 N3

N4

pgNb iNi mod

1bN 2bN3bN 4bN

M1M2 M3 M4

Page 10: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

MODELS OF GROUP KEYS (3)MODELS OF GROUP KEYS (3)

Hybrid Solutions Cluster based.

Group member

Does key generation

Simple node

Key Distribution

Key Agreement

How to construct/maintain clusters?

How to compute inter-cluster keys and intra-cluster keys?

How about a security based clustering?

Page 11: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 11

Good interaction

Bad interaction

TrustTrust--based Clusteringbased ClusteringKnow each other: Establish trust/distrust relations

Application dependent

Peer to peer network:Nodes: promiscuous modeForward packet: +Black hole attack: -Recommendations, etc.

Log and analyzeinteractions

Give scores

Page 12: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 12

TrustTrust--based Clusteringbased Clustering

Two trust thresholds : Smax and Smin

[1, Smin Smax,1] Total trust (TT)

•• tv(tv(i,ji,j) and tv() and tv(j,ij,i) ) Є Є [[SSmaxmax,1],1]

Partiel Trust (PT)•• tv(tv(i,ji,j) ) Є Є [[SSmaxmax,1] and ,1] and tv(tv(j,ij,i) ) Є Є [[SSminmin, , SSmaxmax]]•• tv(tv(i,ji,j) ) Є Є [[SSminmin, , SSmaxmax] and ] and tv(tv(j,ij,i) ) Є Є [[SSmaxmax,1],1]•• tv(tv(i,ji,j) ) and and tv(tv(j,ij,i) ) Є Є [[SSminmin, , SSmaxmax]]

Distrust (DT)•• tv(tv(i,ji,j) ) and and tv(tv(j,ij,i) ) Є Є [[--1, 1, SSminmin]]

i

j

k

tv(i,j)

tv(i,k)

tv(k,i)

tv(j,i)

l

tv(i,l)

tv(l,i)

Page 13: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA 1313

TrustTrust--based Clusteringbased Clustering

Two trust thresholds : Smax and Smin

Total trust (TT)•• tv(tv(i,ji,j) and tv() and tv(j,ij,i) ) Є Є [[SSmaxmax,1],1]

Partiel Trust (PT)•• tv(tv(i,ji,j) ) Є Є [[SSmaxmax,1] and ,1] and tv(tv(j,ij,i) ) Є Є [[SSminmin, , SSmaxmax]]•• tv(tv(i,ji,j) ) Є Є [[SSminmin, , SSmaxmax] and ] and tv(tv(j,ij,i) ) Є Є [[SSmaxmax,1],1]•• tv(tv(i,ji,j) ) and and tv(tv(j,ij,i) ) Є Є [[SSminmin, , SSmaxmax]]

Distrust (DT)•• tv(tv(i,ji,j) ) and and tv(tv(j,ij,i) ) Є Є [[--1, 1, SSminmin]]

i

j

k

l

TT

PT

DT

Page 14: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

Hamida SEBA

ClusterheadsMax number of

TT relations

TrustTrust--based Clusteringbased Clustering

Distrusted node

Cluster periphery

(keydistribution

zone)

Cluster core (TT)(key agreement

zone)

Self-stabilizing algorithm: Adaptive Self-maintaining

Page 15: Trust based Clustering for Group Key Management · Microsoft PowerPoint - Presentation-SecurityWorkshop-LIRIS-18-10-2013.pptx Author: Hamida Created Date: 10/29/2013 3:59:59 PM ...

15Hamida SEBA 15

1

3

1

2

2

23

3

3

1

11

1

1

2

1

3

3

3

1

1

1

12

1

3

2

2

ExampleExample