Security for FLUTE over Satellite Networks

Data transmission, such as software update, large file broadcasting and video on demand, can take advantage of the wide coverage and the broadcasting features of the satellite networks. The multicast technologies provide the support for these applications by efficiently using the expensive satellite bandwidth. One of them is the File Delivery over Unidirectional Transport (FLUTE) protocol [1] that is ideally for bulk of data reliable transmission over the satellite. However, FLUTE does not address any congestion control and security mechanisms. This paper is analyzing the advantages and drawbacks for security over different layers in a satellite network and presenting security considerations for the FLUTE over satellite networks by analyzing the threats and trying to provide security approaches at the Reliable Multicast Transport (RMT) layer for it. The work presented in this paper also analyzes the logical key hierarchy (LHK) for FLUTE protocol and gives the recommendation on the hierarchy structure for efficient re-key.

[1]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[2]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[3]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[4]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[5]  Andrea Colegrove,et al.  Group Secure Association Key Management Protocol , 2000 .

[6]  Mark Watson,et al.  Forward Error Correction (FEC) Building Block , 2007, RFC.

[7]  Dahlia Malkhi,et al.  Secure reliable multicast protocols in a WAN , 2000, Distributed Computing.

[8]  Haitham S. Cruickshank,et al.  Networking issues in IP multicast over satellite , 2003, Int. J. Satell. Commun. Netw..

[9]  Clifford J. Weinstein,et al.  Vulnerabilities of reliable multicast protocols , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[10]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[11]  Mark Watson,et al.  Asynchronous Layered Coding (ALC) Protocol Instantiation , 2010, RFC.

[12]  Haitham S. Cruickshank,et al.  Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.

[13]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[14]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[15]  Scott O. Bradner,et al.  IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols , 1998, RFC.

[16]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[17]  Stephen T. Kent,et al.  IP Authentication Header , 1995, RFC.

[18]  Jon Crowcroft,et al.  Internet Multicast Tomorrow , 2002 .