[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Multicast services and wireless interconnection networks are among the emerging technologies of the last decade. A significant amount of research has been separately performed in the areas of secure multicast and wireless interconnection networks. In this paper we investigate the issues of designing secure multicast services in wireless mobile environments for dynamic groups and propose protocols for key management for a variety of scenarios. Our solution decouples mobility management from group dynamics management, by taking into account the level of trust in the support stations. In particular, we show that protocol efficiency on the mobile host side can be traded-off with the level of trust in the support stations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. B.R. Badrinath, A. Acharya and T. Imielinski, Impact of mobility on distributed computations, ACM SIGOPS Review (1993) 15–20.

  2. A. Ballardie, Scalable multicast key distribution, RFC 1949 (May 1996).

  3. M. Burmester and Y.G. Desmedt, Efficient and secure conference key distribution, in: Proc. Security Protocol Workshop (1996) pp. 119–129.

  4. R. Canetti and B. Pinkas, A taxonomy of multicast security issues, Internet Draft, draft-canetti-secure-multicasttaxonomy-00.txt (April 1999).

  5. R. Canetti, J. Garay, G. Itkis, D. Minciaccio, M. Naor and B. Pinkas, Multicast security: A taxonomy and efficient reconstructions, in: Proc. IEEE INFOCOM'99 (1999).

  6. G. Caronni, H. Lubich, A. Aziz, T. Markson and R. Skrenta, SKIP: Securing the Internet, in: Proc. IEEE 5th Workshop on Enabling Technologies (WET ICE) (1996).

  7. G.H. Chiou and W.T. Chen, Secure broadcasting using the secure lock, IEEE Transactions on Software Engineering 15(8) (1989) 929–934.

    Google Scholar 

  8. S.E. Deering, Multicast routing in internetworks and extended LANs, in: Proc. ACM SIGCOMM'88 (1988) pp. 55–77.

  9. A. Fiat and M. Naor, Broadcast encryption, in: Advances in Cryptology: CRYPTO'93, Lecture Notes in Computer Science, Vol. 773 (1993) pp. 480–491.

  10. L. Gong and N. Sacham, Multicast security and its extension to a mobile environment, Wireless Networks 1(3) (1995) 281–295.

    Google Scholar 

  11. H. Harney and C. Muckenhirn, Group key management protocol (GKMP) specification, RFC 2093 (July 1997).

  12. H. Harney and C. Muckenhirn, Group key management protocol (GKMP) architecture, RFC 2094 (July 1997).

  13. D. Harkins and D. Carel, The Internet key exchange (IKE), RFC 2409 (1998).

  14. T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM 37(10) (1994) 18–28.

    Google Scholar 

  15. P. Kruus, A survey of multicast security issues and architectures, in: Proc. 21st National Information Systems Security Conference (1998).

  16. M. Macedonia and D. Brutzman, MBONE: The Multicast BackbONE, http://www.cs.ucl.ac.uk/mice/mbone_review.html

  17. T. Matsumoto and H. Imai, On the Key predistribution system – A practical solution to the key distribution problem, in: Advances in Cryptology: CRYPTO'87, Lecture Notes in Computer Science, Vol. 293 (1988) pp. 185–193.

    Google Scholar 

  18. D. Maugham, M. Schertler, M. Schneider and J. Turner, Internet security association and key management protocol (ISAKMP), RFC 2408 (November 1998).

  19. S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. ACM SIGCOMM'97 (1997) pp. 277–288.

  20. M. Steiner, G. Tsudik and M. Waidner, Diffie–Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communication Security (1996).

  21. M. Steiner, G. Tsudik and M. Waidner, Cliques: A protocol suite for key agreement in dynamic groups, Research Report RZ 2984 (#93030), IBM Zürich Research Lab (1997).

  22. M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner, The VersaKey framework: Versatile group key management, IEEE Journal on Selected Areas in Communications 17(9) (1999) 1614–1631.

    Google Scholar 

  23. D.M. Wallner, E.J. Harder and R.C. Agee, Key management for multicast: Issues and architectures, RFC 2627 (June 1999).

  24. C.K. Wong, M. Gouda and S.S. Lam, Secure group communications using key graphs, in: Proc. ACM SIGGOMM'98 (1998) pp. 68–79.

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bruschi, D., Rosti, E. Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. Mobile Networks and Applications 7, 503–511 (2002). https://doi.org/10.1023/A:1020781305639

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1020781305639

Navigation