Advertisement

Distributed Group Access Control Architecture for Secure Multicast

  • John Felix C
  • Valli S
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3261)

Abstract

Multicast technology has become significant due to its support for collaborative applications such as distance learning, multiparty conferencing etc. Commercial deployment of multicast is hindered due to its security vulnerabilities such as denial of service, theft of service, masquerading and eavesdropping. The proposed group access control architecture is overlaid on a distributed routing scheme, which reduces the rekeying frequency through a distributed approach. Three major modules developed for this distributed group access control architecture are the group access control system, the group policy management system and group key management. The core of the architecture namely, the group access control system obtains a mutual support from group policy and group key management systems. Analysis is done, by observing the message and computational overhead due to the implementation of this architecture.

Keywords

Span Tree Multicast Group Threshold Scheme Group Policy Message Overhead 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C, J.F., S, V.: Distributed Multicast Routing for Efficient Group Key Management. In: Yazıcı, A., Şener, C. (eds.) ISCIS 2003. LNCS, vol. 2869, pp. 747–754. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Eriksson, H.: MBONE: The Multicast Backbone. Communications of the ACM 37(8), 54–60 (1994)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Ballardie, A., Crowcroft, J.: Multicast-specific security threats and countermeasures. In: Proceedings of ISOC Symposium on Network and Distributed System Security, San Diego, California, p. 216 (February 1995)Google Scholar
  4. 4.
    Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures., RFC 2627, IETF (June 1999)Google Scholar
  5. 5.
    Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. ACM SIGCOMM, Cannes, France, pp. 277–288 (September 1997)Google Scholar
  6. 6.
    Judge, P., Ammar, M.: Gothic: A Group Access Control Architecture for Secure Multicast and Anycast. IEEE INFOCOM, 1547–1556 (June 2002)Google Scholar
  7. 7.
    Sahasrabuddhe, L.H., Mukherjee, B.: Multicast routing algorithms and protocols: A tutorial. IEEE Network (1), 90–102 (2000)Google Scholar
  8. 8.
    Gong, L., Shacham, N.: Elements of trusted multicasting. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp.176–183 (1994)Google Scholar
  9. 9.
    Rivest, R., Lampson, B.: SDSI a simple distributed security infrastructure, Technical report, M.I.T. (April 1996)Google Scholar
  10. 10.
    Trcek, D.: Security policy management for networked information systems. In: NOMS 2000 - IEEE/IFIP Network Operations and Management Symposium, September 2000, vol. (1), pp. 817–830 (2000)Google Scholar
  11. 11.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure group communication using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)CrossRefGoogle Scholar
  12. 12.
    Stallings, W.: Network and Internetwork Security. Prentice Hall Inc., Englewood Cliffs (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • John Felix C
    • 1
  • Valli S
    • 1
  1. 1.College of Engineering, GuindyAnna UniversityChennaiIndia

Personalised recommendations