Skip to main content

An Approach to the Charging of Secure IP Multicast Services

  • Conference paper
Group Communications and Charges. Technology and Business Models (NGC 2003, ICQT 2003)

Abstract

The massive deployment of IP multicast-based services raises important issues, as far as the security is concerned. In particular, there is a growing need for ISPs to be able to provide some guarantees with respect to the identification and authentication of sources and receivers, not to mention the preservation of the confidentiality of the traffic that will be forwarded along the dynamically computed distribution trees. In this paper, we propose a generic scheme where service providers will play a key role for the provisioning of secure IP multicast services, based on the ongoing standardisation effort being conducted within the msec working group of the IETF. A first part relates to cryptographic services, e.g. data authentication and encryption, and highlights the role a telecom operator could play in securing group communications. In particular, various opportunities for providing GCKS (Group Controller and Key Server) services and cryptographic treatment services, are discussed depending on the targeted market and the use made of the deployed IP multicast network. A second part emphasizes the opportunities offered by multicast content security and the associated key management, to perform accounting. The way a telecom operator could take advantage of such possibilities in order to offer value-added services is discussed. Various accounting and billing models, made possible by the msec facilities, are demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diot, C., Levine, B.N., Lyles, B., Kassan, H., Balsiefien, D.: Deployment issues for the IP multicast service and architecture. IEEE Network, Special issue on multicasting (January/February 2000)

    Google Scholar 

  2. Perrig, R., Canetti, J.D., Tygar, D., Song, X.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2000, pp. 56–73 (2000)

    Google Scholar 

  3. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and efficient constructions. In: Proceedings of IEEE INFOCOM, New York (March 1999)

    Google Scholar 

  4. Baugher, M., Hardjono, T., Harney, H., Weis, B.: The Group Domain of Interpretation, draft-ietf-msec-gdoi-08.txt (May 2003) (work in progress)

    Google Scholar 

  5. Harney, H., Baugher, M., Hardjono, T.: GKM Building Block: Group Security Association (GSA) Definition, draftirtf- smug-gkmbb-gsadef-01.txt (September 2000) (expired)

    Google Scholar 

  6. Harney, H., Colegrove, A., Harder, E., Meth, U., Fleischer, R.: Group Secure Association Key Management Protocol, draft-ietf-msec-gsakmp-sec-01.txt (February 2003) (work in progress)

    Google Scholar 

  7. Hardjono, T., Canetti, R., Baugher, M., Dinsmore, P.: Secure IP Multicast: Problem areas, Framework, and Building Blocks, draft-irtf-smug-framework-01.txt (September 2001) (expired)

    Google Scholar 

  8. Deering, S.: Host Extensions for IP Multicasting (August 1989)

    Google Scholar 

  9. Kent, A.: Security Architecture for the Internet Protocol (November 1998)

    Google Scholar 

  10. Kent, A.: IP Encapsulating Security Payload (ESP) (November 1998)

    Google Scholar 

  11. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures (June 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Laniepce, S., Achemlal, M. (2003). An Approach to the Charging of Secure IP Multicast Services. In: Stiller, B., Carle, G., Karsten, M., Reichl, P. (eds) Group Communications and Charges. Technology and Business Models. NGC ICQT 2003 2003. Lecture Notes in Computer Science, vol 2816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39405-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39405-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20051-2

  • Online ISBN: 978-3-540-39405-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics