Techniques and issues in multicast security

Multicast networking support is becoming an increasingly important future technology area for both commercial and military distributed and group-based applications. Integrating a multicast security solution involves numerous engineering tradeoffs. The end goal of effective operational performance and scalability over a heterogeneous internetwork is of primary interest for widescale adoption and application of such a capability. Various techniques that have been proposed to support multicast security are discussed and their relative merits are explored.

[1]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[2]  Tony Ballardie,et al.  Core Based Trees (CBT) Multicast Routing Architecture , 1997, RFC.

[3]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[4]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[5]  Dave Thaler,et al.  Distance-Vector Multicast Routing Protocol MIB , 1999 .

[6]  R. Oppliger,et al.  Participant registration, validation, and key distribution for large-scale conferencing systems , 1997 .

[7]  Rolf Oppliger,et al.  Distributed registration and key distribution (DiRK) , 1996, SEC.

[8]  Bernhard Plattner,et al.  Efficient security for large and dynamic multicast groups , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[9]  Georg Carle,et al.  Survey on Error Recovery for IP-based Audio-Visual Multicast Applications , 1997 .

[10]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[11]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[12]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[13]  Georg Carle,et al.  Survey of error recovery techniques for IP-based audio-visual multicast applications , 1997, IEEE Netw..

[14]  John Moy,et al.  Multicast Extensions to OSPF , 1994, RFC.

[15]  Joseph P. Macker,et al.  Reliable multicast data delivery for military networking , 1996, Proceedings of MILCOM '96 IEEE Military Communications Conference.

[16]  Deborah Estrin,et al.  Protocol Independent Multicast Version 2 Dense Mode Specification , 1999 .

[17]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[18]  David Thaler,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.