Abstract
Multicast services and wireless interconnection networks are among the emerging technologies of the last decade. A significant amount of research has been separately performed in the areas of secure multicast and wireless interconnection networks. In this paper we investigate the issues of designing secure multicast services in wireless mobile environments for dynamic groups and propose protocols for key management for a variety of scenarios. Our solution decouples mobility management from group dynamics management, by taking into account the level of trust in the support stations. In particular, we show that protocol efficiency on the mobile host side can be traded-off with the level of trust in the support stations.
Similar content being viewed by others
References
B.R. Badrinath, A. Acharya and T. Imielinski, Impact of mobility on distributed computations, ACM SIGOPS Review (1993) 15–20.
A. Ballardie, Scalable multicast key distribution, RFC 1949 (May 1996).
M. Burmester and Y.G. Desmedt, Efficient and secure conference key distribution, in: Proc. Security Protocol Workshop (1996) pp. 119–129.
R. Canetti and B. Pinkas, A taxonomy of multicast security issues, Internet Draft, draft-canetti-secure-multicasttaxonomy-00.txt (April 1999).
R. Canetti, J. Garay, G. Itkis, D. Minciaccio, M. Naor and B. Pinkas, Multicast security: A taxonomy and efficient reconstructions, in: Proc. IEEE INFOCOM'99 (1999).
G. Caronni, H. Lubich, A. Aziz, T. Markson and R. Skrenta, SKIP: Securing the Internet, in: Proc. IEEE 5th Workshop on Enabling Technologies (WET ICE) (1996).
G.H. Chiou and W.T. Chen, Secure broadcasting using the secure lock, IEEE Transactions on Software Engineering 15(8) (1989) 929–934.
S.E. Deering, Multicast routing in internetworks and extended LANs, in: Proc. ACM SIGCOMM'88 (1988) pp. 55–77.
A. Fiat and M. Naor, Broadcast encryption, in: Advances in Cryptology: CRYPTO'93, Lecture Notes in Computer Science, Vol. 773 (1993) pp. 480–491.
L. Gong and N. Sacham, Multicast security and its extension to a mobile environment, Wireless Networks 1(3) (1995) 281–295.
H. Harney and C. Muckenhirn, Group key management protocol (GKMP) specification, RFC 2093 (July 1997).
H. Harney and C. Muckenhirn, Group key management protocol (GKMP) architecture, RFC 2094 (July 1997).
D. Harkins and D. Carel, The Internet key exchange (IKE), RFC 2409 (1998).
T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM 37(10) (1994) 18–28.
P. Kruus, A survey of multicast security issues and architectures, in: Proc. 21st National Information Systems Security Conference (1998).
M. Macedonia and D. Brutzman, MBONE: The Multicast BackbONE, http://www.cs.ucl.ac.uk/mice/mbone_review.html
T. Matsumoto and H. Imai, On the Key predistribution system – A practical solution to the key distribution problem, in: Advances in Cryptology: CRYPTO'87, Lecture Notes in Computer Science, Vol. 293 (1988) pp. 185–193.
D. Maugham, M. Schertler, M. Schneider and J. Turner, Internet security association and key management protocol (ISAKMP), RFC 2408 (November 1998).
S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. ACM SIGCOMM'97 (1997) pp. 277–288.
M. Steiner, G. Tsudik and M. Waidner, Diffie–Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communication Security (1996).
M. Steiner, G. Tsudik and M. Waidner, Cliques: A protocol suite for key agreement in dynamic groups, Research Report RZ 2984 (#93030), IBM Zürich Research Lab (1997).
M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner, The VersaKey framework: Versatile group key management, IEEE Journal on Selected Areas in Communications 17(9) (1999) 1614–1631.
D.M. Wallner, E.J. Harder and R.C. Agee, Key management for multicast: Issues and architectures, RFC 2627 (June 1999).
C.K. Wong, M. Gouda and S.S. Lam, Secure group communications using key graphs, in: Proc. ACM SIGGOMM'98 (1998) pp. 68–79.
Rights and permissions
About this article
Cite this article
Bruschi, D., Rosti, E. Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. Mobile Networks and Applications 7, 503–511 (2002). https://doi.org/10.1023/A:1020781305639
Issue Date:
DOI: https://doi.org/10.1023/A:1020781305639