SlideShare uma empresa Scribd logo
1 de 11
A
seminar on

An Efficient Improved Group Key Agreement Protocol Based on
Diffie-Hellman Key Exchange

Presented By:
Jayant Rajurkar
M-Tech (CSE)

1

1
Introduction
• Traditional group key generating methods
using binary-tree performs efficiently when
adding or deleting nodes dynamically.
• when dealing with group key among multinodes in the Internet, their time complexity
grows to O(Nlog2N).
• an improved group key agreement protocol
based on Diffie-Hellman key exchange, which
can reduce the time complexity of this
situation to O(N).
ALGORITHM DESCRIPTIONS
• This method of rapidly generating group key
has a differences in both generating and
maintaining procedures.
• first there is a managing node which is
responsible for gathering and dispatching
information of generating group key.
• second the algorithm is different between
managing node and nonmanaging node to
maintain its binary-tree.
Select Managing Node
we should select one node as managing node
preferred to select the computer with the
strongest capability a s the managing node
If the m nodes are equal in their computing
capability, selection will be carried on
according to IP addresses
IP address is an unsigned 32 bits integer, so we
can select the one with the smallest or the
largest as the managing node.
Generate Complete Binary-tree by Managing Node


each non-managing node sends its Diffie-Hellman
key exchanging “ingredient” to the managing node

After receiving m-1 pieces of ingredients from others and
adding its own ingredient, the managing node can generate
and maintain a complete binary-tree inside its memory, also
calculate the group key using the binary tree.
DYNAMICALLY ADDING AND DELETING
Nodes’ Dynamically Adding

 No matter whether it is the managing node or
nonmanaging node, the updating operation for
adding new node will be completed within
log2N layers in itself binary-tree for each node.

 After updating itself, the managing node takes
its responsibility to send necessary updating
information packages to other non-managing
nodes.
• Nodes’ Dynamically Deleting
Deletion of Non-Managing Nodes:

 The deletion of non-managing nodes is similar to
the adding, beginning with updating the
information stored in the managing node,
followed by sending the necessary information
selected by managing node to every nonmanaging node.
Deletion of Managing Node:
 Before deleting the managing node, a new managing node
should be selected first based on the selection regulation.
 The previous managing node transfers its binary-tree
structure to the new managing node using the old group
key.
PERFORMANCE ANALYSES
• This method starts computing after gathering all the
needed information, which means that each inner
node is calculated only once.
• As a consequence, the time complexity is log2N
rather than the traditional Nlog2N.
• The average time complexity for non-managing
• Nodes may be much smaller than log2N, because the
information stored in each non-managing node is
limited to the minimum received from the managing
node after its selection, which largely reduces the
time cost in the nonmanaging nodes.
SECURITY ANALYSES

• In terms of traditional Diffie-Hellman key-exchange
protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack)
• The traditional MITM attack can hardly validate to this
method of group key generation.
• One improved MITM can hijack all the communicating
paths between the managing node and other nonmanaging nodes, which works by hijacking the managing
node.
• we can use digital signature technology to defeat this
attack.
• Adding digital signature based authentication technology
to the DH based key exchange protocol also has been
quite common and sophisticated.
Conclusion
• It can effectively reduce overlapping
computing, decrease the packages sending
times, and cut the time complexity from
O(Nlog2N) of traditional binary-tree method
down to O(N).
• The non-managing nodes still maintain basic
binary-tree structure, which enhances the
speed of dynamically adding and deleting
nodes.
• Deals with MITM attack, and come up with an
effective solution to this attack.
THANK YOU……

Mais conteúdo relacionado

Mais procurados

resource management
  resource management  resource management
resource management
Ashish Kumar
 
dos mutual exclusion algos
dos mutual exclusion algosdos mutual exclusion algos
dos mutual exclusion algos
Akhil Sharma
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
Sidharth Goel
 
group presentation
group presentationgroup presentation
group presentation
s1120099
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7
Woojin Joe
 

Mais procurados (20)

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
resource management
  resource management  resource management
resource management
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
dos mutual exclusion algos
dos mutual exclusion algosdos mutual exclusion algos
dos mutual exclusion algos
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Network management
Network managementNetwork management
Network management
 
The Power Of Event Chapter 3
The Power Of Event Chapter 3The Power Of Event Chapter 3
The Power Of Event Chapter 3
 
Distributed System Security Aspects
Distributed System Security AspectsDistributed System Security Aspects
Distributed System Security Aspects
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
SNMP
SNMPSNMP
SNMP
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
group presentation
group presentationgroup presentation
group presentation
 
The Power Of Event Chapter 1
The Power Of Event Chapter 1The Power Of Event Chapter 1
The Power Of Event Chapter 1
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
Chapter00000000
Chapter00000000Chapter00000000
Chapter00000000
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 

Destaque

Network based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocolNetwork based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocol
JAYANT RAJURKAR
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 

Destaque (19)

Network based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocolNetwork based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocol
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCYPROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
 
Programming Hybrid Services in the Cloud
Programming Hybrid Services in the CloudProgramming Hybrid Services in the Cloud
Programming Hybrid Services in the Cloud
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Crypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfCrypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourself
 
Multi-Party Computation for the Masses
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the Masses
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
CompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud Computing
 
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Seminar cloud computing
Seminar cloud computingSeminar cloud computing
Seminar cloud computing
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 

Semelhante a poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange "

Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...
Mumbai Academisc
 
1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf
arihantelehyb
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
fashiionbeutycare
 

Semelhante a poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange " (20)

Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
231 236
231 236231 236
231 236
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsDistributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
 
Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...
 
Computer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemComputer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer system
 
1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
IoT Heap 2
IoT Heap 2IoT Heap 2
IoT Heap 2
 
Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
08-sdnfvmec.pdf
08-sdnfvmec.pdf08-sdnfvmec.pdf
08-sdnfvmec.pdf
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux Networking
 
운영체제론 Ch22
운영체제론 Ch22운영체제론 Ch22
운영체제론 Ch22
 

Último

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Último (20)

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 

poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange "

  • 1. A seminar on An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange Presented By: Jayant Rajurkar M-Tech (CSE) 1 1
  • 2. Introduction • Traditional group key generating methods using binary-tree performs efficiently when adding or deleting nodes dynamically. • when dealing with group key among multinodes in the Internet, their time complexity grows to O(Nlog2N). • an improved group key agreement protocol based on Diffie-Hellman key exchange, which can reduce the time complexity of this situation to O(N).
  • 3. ALGORITHM DESCRIPTIONS • This method of rapidly generating group key has a differences in both generating and maintaining procedures. • first there is a managing node which is responsible for gathering and dispatching information of generating group key. • second the algorithm is different between managing node and nonmanaging node to maintain its binary-tree.
  • 4. Select Managing Node we should select one node as managing node preferred to select the computer with the strongest capability a s the managing node If the m nodes are equal in their computing capability, selection will be carried on according to IP addresses IP address is an unsigned 32 bits integer, so we can select the one with the smallest or the largest as the managing node.
  • 5. Generate Complete Binary-tree by Managing Node  each non-managing node sends its Diffie-Hellman key exchanging “ingredient” to the managing node After receiving m-1 pieces of ingredients from others and adding its own ingredient, the managing node can generate and maintain a complete binary-tree inside its memory, also calculate the group key using the binary tree.
  • 6. DYNAMICALLY ADDING AND DELETING Nodes’ Dynamically Adding  No matter whether it is the managing node or nonmanaging node, the updating operation for adding new node will be completed within log2N layers in itself binary-tree for each node.  After updating itself, the managing node takes its responsibility to send necessary updating information packages to other non-managing nodes.
  • 7. • Nodes’ Dynamically Deleting Deletion of Non-Managing Nodes:  The deletion of non-managing nodes is similar to the adding, beginning with updating the information stored in the managing node, followed by sending the necessary information selected by managing node to every nonmanaging node. Deletion of Managing Node:  Before deleting the managing node, a new managing node should be selected first based on the selection regulation.  The previous managing node transfers its binary-tree structure to the new managing node using the old group key.
  • 8. PERFORMANCE ANALYSES • This method starts computing after gathering all the needed information, which means that each inner node is calculated only once. • As a consequence, the time complexity is log2N rather than the traditional Nlog2N. • The average time complexity for non-managing • Nodes may be much smaller than log2N, because the information stored in each non-managing node is limited to the minimum received from the managing node after its selection, which largely reduces the time cost in the nonmanaging nodes.
  • 9. SECURITY ANALYSES • In terms of traditional Diffie-Hellman key-exchange protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack) • The traditional MITM attack can hardly validate to this method of group key generation. • One improved MITM can hijack all the communicating paths between the managing node and other nonmanaging nodes, which works by hijacking the managing node. • we can use digital signature technology to defeat this attack. • Adding digital signature based authentication technology to the DH based key exchange protocol also has been quite common and sophisticated.
  • 10. Conclusion • It can effectively reduce overlapping computing, decrease the packages sending times, and cut the time complexity from O(Nlog2N) of traditional binary-tree method down to O(N). • The non-managing nodes still maintain basic binary-tree structure, which enhances the speed of dynamically adding and deleting nodes. • Deals with MITM attack, and come up with an effective solution to this attack.