Abstract
This chapter is an overview of security requirements raised by multicast communications along with a survey of principal solutions. A detailed requirement analysis points out the characteristics of multicast in terms of security and scalability. The differences between unicast and multicast communications with respect to the design of authentication and confidentiality mechanisms are discussed. Main confidentiality proposals are analyzed in a detailed comparison survey based on the security and scalability criteria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Lecture Notes in CS, 1109:1–15, 1996.
M. V. D. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Alfredo De Santis, editor, Advances in Cryptology-EuroCrypt’ 94, pages 275–286, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950.
Mihir Bellare, Anand Desai, E. Jokipii, and Phillip Rogaway. A concrete security treatment of symmetric encryption. In IEEE Symposium on Foundations of Computer Science, pages 394–403, 1997.
Bob Briscoe. MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences. In First International Workshop on Networked Group Communication, November 1999.
Isabella Chang, Robert Engel, Dilip Kandlur, Dimitrios Pendarakis, and Debanjan Saha. Key management for secure internet multicast using boolean function minimization techniques. In Proceedings IEEE Infocomm’99, volume 2, pages 689–698, March 1999.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE Infocom’99, 1999.
Germano Caronni, Marcel Waldvogel, Dan Sun, and Berhardt Plattner. Efficient security for large and dynamic multicast groups. In IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’ 98), 1998.
Steve E. Deering. RFC 1112: Host extensions for IP multicasting, Aug 1989.
Steve E. Deering. Multicast Routing in a Datagram Internetwork. PhD thesis, Stanford University, 1991.
W. Fenner. Internet group management protocol, version 2. Request For Comments 2236, November 1997. see also draft-ietf-idmr-igmpv3-and-routing-01.txt for IGMP v3.
V. Fuller, T. Li, J. Yu, and K. Varadhan. Supernetting: an address assignment and aggregation strategy, 1992.
A. Fiat and M. Naor. Broadcast encryption. In Douglas R. Stinson, editor, Advances in Cryptology-Crypto’ 93, pages 480–491, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 773.
Thomas Hardjono, Brad Cain, and Naganand Doraswamy. A framework for group key management for multicast security. Internet-Draft, work in progress, February 2000.
Xiaozhou Steve Li, Yang Richard Yang, Mohamed G. Gouda, and Simon S. Lam. Batch rekeying for secure group communications. In Tenth International World Wide Web conference, pages 525–534, 2001.
Suivo Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM’97 (September 14–18, 1997, Cannes, France), 1997.
John Moy. Multicast extensions to OSPF. Request For Comment 1584, March 1994.
T. Maufer and C. Semeria. Introduction to IP multicast routing. Internet-Draft, July 1997. draft-ietf-mboned-intro-multicast-03.txt.
David A. McGrew and Alan T. Sherman. Key establishment in large dynamic groups using one-way function trees. Technical report, TIS Labs at Network Associates, Inc., Glenwood, MD, 1998.
National Institute of Standards and Technology. Advanced Encryption Standard, 2001.
R. Poovendran and John S. Baras. An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. In CRYPTO, pages 624–638, 1999.
Adrian Perrig, Dawn Song, and Doug Tygar. ELK, a new protocol for efficient large-group key distribution. In IEEE Symposium on Security and Privacy, May 2001.
R.L. Rivest. The RC5 encryption algorithm. In In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86–96. Springer Verlag, 1995.
Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM Conference on Communications Security (March 14-16, 1996, New Delhi, India), 1996.
Michael Steiner, Gene Tsudik, and Michael Waidner. CLIQUES: A new approach to group key agreement. In Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS’98), pages 380–387, Amsterdam, May 1998. IEEECSP.
Northern District of California United States District Court. RIAA v. Napster, court’s 512(a) ruling, 1999.
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In ACM SIGCOMM 1998, pages 68–79, 1998.
Debby M. Wallner, Eric J. Harder, and Ryan C. Agee. Key management for multicast: Issues and architectures. Internet draft, Network working group, september 1998, 1998.
C. Wong and S. Lam. Keystone: a group key management system. In Proceedings of International Conference in Telecommunications, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Molva, R., Pannetrat, A. (2002). Network Security in the Multicast Framework. In: Gregori, E., Anastasi, G., Basagni, S. (eds) Advanced Lectures on Networking. NETWORKING 2002. Lecture Notes in Computer Science, vol 2497. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36162-6_3
Download citation
DOI: https://doi.org/10.1007/3-540-36162-6_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00165-2
Online ISBN: 978-3-540-36162-6
eBook Packages: Springer Book Archive