Distributed Group Access Control Architecture for Secure Multicast
Multicast technology has become significant due to its support for collaborative applications such as distance learning, multiparty conferencing etc. Commercial deployment of multicast is hindered due to its security vulnerabilities such as denial of service, theft of service, masquerading and eavesdropping. The proposed group access control architecture is overlaid on a distributed routing scheme, which reduces the rekeying frequency through a distributed approach. Three major modules developed for this distributed group access control architecture are the group access control system, the group policy management system and group key management. The core of the architecture namely, the group access control system obtains a mutual support from group policy and group key management systems. Analysis is done, by observing the message and computational overhead due to the implementation of this architecture.
KeywordsSpan Tree Multicast Group Threshold Scheme Group Policy Message Overhead
Unable to display preview. Download preview PDF.
- 3.Ballardie, A., Crowcroft, J.: Multicast-specific security threats and countermeasures. In: Proceedings of ISOC Symposium on Network and Distributed System Security, San Diego, California, p. 216 (February 1995)Google Scholar
- 4.Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures., RFC 2627, IETF (June 1999)Google Scholar
- 5.Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. ACM SIGCOMM, Cannes, France, pp. 277–288 (September 1997)Google Scholar
- 6.Judge, P., Ammar, M.: Gothic: A Group Access Control Architecture for Secure Multicast and Anycast. IEEE INFOCOM, 1547–1556 (June 2002)Google Scholar
- 7.Sahasrabuddhe, L.H., Mukherjee, B.: Multicast routing algorithms and protocols: A tutorial. IEEE Network (1), 90–102 (2000)Google Scholar
- 8.Gong, L., Shacham, N.: Elements of trusted multicasting. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp.176–183 (1994)Google Scholar
- 9.Rivest, R., Lampson, B.: SDSI a simple distributed security infrastructure, Technical report, M.I.T. (April 1996)Google Scholar
- 10.Trcek, D.: Security policy management for networked information systems. In: NOMS 2000 - IEEE/IFIP Network Operations and Management Symposium, September 2000, vol. (1), pp. 817–830 (2000)Google Scholar
- 12.Stallings, W.: Network and Internetwork Security. Prentice Hall Inc., Englewood Cliffs (1995)Google Scholar