Abstract
To provide multicast confidentiality, the traffic data is encrypted with a session key known only to certificated group members, which should be updated dynamically whenever there is a change in the group membership. We present the Secure Multicast Infrastructure as a general solution for securing many-to-many group communications that can be relied on by concurrent multicast applications. Rekey algorithms and protocols for data transmission are specified. The main features of our solution include strong scalability and observable reliability.
This work was supported by the National Natural Science Foundation of China under Grant No. 60272043 and the National High-Tech Research and Development Plan of China under Grant No. 2002AA121067.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: INFOCOM 1999, March 1999, pp. 708–716 (1999)
Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. IEEE Network 17(1), 30–36 (2003)
Mittra, S.: Iolus: a framework for scalable secure multicasting. ACM SIGCOMM Computer Communication Review 27(4), 277–288 (1997)
Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. RFC2093 (July 1997)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM transactions on networking 8(1), 16–30 (2000)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. RFC2627 (June 1999)
Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)
Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch rekeying for secure group communications. In: 10th international conference on World Wide Web, May 2001, pp. 525–534 (2001)
Dondeti, L.R., Mukherjee, S., Samal, A.: Comparison of scalable key distribution schemes for secure group communication. In: GLOBECOM 1999, December 1999, pp. 1774–1778 (1999)
Fan Du, L.M., Ni, A.-H.: Esfahanian: Towards solving multicast key management problem. In: 8th International Conference on Computer Communications and Networks, October 1999, pp. 232–236 (1999)
Chen, W., Dondeti, L.R.: Recommendations in Using Group KeyManagement Algorithms. In: DARPA Information Survivability Conference and Exposition 2003, April 2003, pp. 222–227 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, W.T., Li, J.S., Hong, P.L. (2004). Rethinking of Iolus: Constructing the Secure Multicast Infrastructure. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_90
Download citation
DOI: https://doi.org/10.1007/978-3-540-25978-7_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23034-2
Online ISBN: 978-3-540-25978-7
eBook Packages: Springer Book Archive