Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication

Transport Layer Security (TLS) provides reliable and in-order communication. However due to its retransmission behavior it causes delay that is inappropriate for real time applications. Datagram Transport Layer Security (DTLS) can be used as an efficient alternate for securing the real time communication because of its unreliable and out of order features. Real-time secure multicast communication is an effective technique which mainly focuses on 'key distribution', 'forward and backward security', 'participant's authentication' and scalability. An extensive research is available for providing security to peer-to-peer (P2P) application using DTLS. However, no specific efforts have been made regarding its use for securing multicast communication. This paper not only reviews the structure of DTLS protocol in terms of security but also proposes a secure reliable multicast scheme using DTLS.

[1]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[2]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[3]  K. Saravanan,et al.  Efficient Star Topology based Multicast Key Management Algorithm , 2012 .

[4]  Tony Ballardie,et al.  Core Based Trees (CBT) Multicast Routing Architecture , 1997, RFC.

[5]  Kenneth G. Paterson,et al.  Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[7]  Stephen Deering,et al.  Internet group management protocol , 1996 .

[8]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[9]  Mark Handley,et al.  Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised) , 2016, RFC.

[10]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[11]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[12]  Mark Handley,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.

[13]  David Thaler,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.

[14]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[15]  Jari Arkko,et al.  MIKEY: Multimedia Internet KEYing , 2004, RFC.

[16]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[17]  Bodo Möller,et al.  Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .

[18]  Brad Cain,et al.  Internet Group Management Protocol, Version 3 , 2002, RFC.

[19]  Eric Rescorla,et al.  TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM) , 2008, RFC.

[20]  Rolf Oppliger SSL and TLS: Theory and Practice , 2009 .

[21]  Burak Bayoğlu Performance evaluation of WTLS handshake protocol using RSA and elliptic curve cryptosystems , 2004 .