Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues

Multicast services and wireless interconnection networks are among the emerging technologies of the last decade. A significant amount of research has been separately performed in the areas of secure multicast and wireless interconnection networks. In this paper we investigate the issues of designing secure multicast services in wireless mobile environments for dynamic groups and propose protocols for key management for a variety of scenarios. Our solution decouples mobility management from group dynamics management, by taking into account the level of trust in the support stations. In particular, we show that protocol efficiency on the mobile host side can be traded-off with the level of trust in the support stations.

[1]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[2]  Tomasz Imielinski,et al.  Impact of mobility on distributed computations , 1993, OPSR.

[3]  Yvo Desmedt,et al.  Efficient and Secure Conference-Key Distribution , 1996, Security Protocols Workshop.

[4]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[5]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[6]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[7]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[8]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[9]  B. R. Badrinath,et al.  A framework for delivering multicast messages in networks with mobile hosts , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[10]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[11]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[12]  Ashar Aziz,et al.  SKIP-securing the Internet , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[13]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[14]  Hideki Imai,et al.  On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.

[15]  Gene Tsudik,et al.  Cliques: a protocol suite for key agreement in dynamic groups , 1997 .

[16]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[17]  B. R. Badrinath,et al.  A framework for delivering multicast messages in networks with mobile hosts , 1996, Mob. Networks Appl..

[18]  Tomasz Imielinski,et al.  Mobile wireless computing: challenges in data management , 1994, CACM.

[19]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[20]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[21]  Stephen E. Deering,et al.  Multicast routing in internetworks and extended LANs , 1988, SIGCOMM '88.

[22]  Don Brutzman,et al.  MBONE, the Multicast BackbONE , 1994 .

[23]  Peter S. Kruus,et al.  A Survey of Multicast Security Issues and Architectures , 1998 .

[24]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[25]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[26]  B. R. Badrinath,et al.  IP multicast extensions for mobile internetworking , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[27]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[28]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.