Skip to main content

Rethinking of Iolus: Constructing the Secure Multicast Infrastructure

  • Conference paper
Information Networking. Networking Technologies for Broadband and Mobile Networks (ICOIN 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3090))

Included in the following conference series:

  • 392 Accesses

Abstract

To provide multicast confidentiality, the traffic data is encrypted with a session key known only to certificated group members, which should be updated dynamically whenever there is a change in the group membership. We present the Secure Multicast Infrastructure as a general solution for securing many-to-many group communications that can be relied on by concurrent multicast applications. Rekey algorithms and protocols for data transmission are specified. The main features of our solution include strong scalability and observable reliability.

This work was supported by the National Natural Science Foundation of China under Grant No. 60272043 and the National High-Tech Research and Development Plan of China under Grant No. 2002AA121067.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: INFOCOM 1999, March 1999, pp. 708–716 (1999)

    Google Scholar 

  2. Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. IEEE Network 17(1), 30–36 (2003)

    Article  Google Scholar 

  3. Mittra, S.: Iolus: a framework for scalable secure multicasting. ACM SIGCOMM Computer Communication Review 27(4), 277–288 (1997)

    Article  Google Scholar 

  4. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. RFC2093 (July 1997)

    Google Scholar 

  5. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM transactions on networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  6. Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. RFC2627 (June 1999)

    Google Scholar 

  7. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)

    Article  Google Scholar 

  8. Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch rekeying for secure group communications. In: 10th international conference on World Wide Web, May 2001, pp. 525–534 (2001)

    Google Scholar 

  9. Dondeti, L.R., Mukherjee, S., Samal, A.: Comparison of scalable key distribution schemes for secure group communication. In: GLOBECOM 1999, December 1999, pp. 1774–1778 (1999)

    Google Scholar 

  10. Fan Du, L.M., Ni, A.-H.: Esfahanian: Towards solving multicast key management problem. In: 8th International Conference on Computer Communications and Networks, October 1999, pp. 232–236 (1999)

    Google Scholar 

  11. Chen, W., Dondeti, L.R.: Recommendations in Using Group KeyManagement Algorithms. In: DARPA Information Survivability Conference and Exposition 2003, April 2003, pp. 222–227 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, W.T., Li, J.S., Hong, P.L. (2004). Rethinking of Iolus: Constructing the Secure Multicast Infrastructure. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25978-7_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23034-2

  • Online ISBN: 978-3-540-25978-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics