Abstract
This paper proposes a design for key management for secure multicast in hybrid satellite networks. Communication satellites offer an efficient way to ex tend IP multicast services for groups in wide-area networks. In order to be commercially viable, the multicast traffic should be accessible only to paying subscribers. Access control can be achieved by data encryption. This requires secure and efficient methods to generate, distribute and update the keys. Most current key management protocols do not scale well when applied to large dy namic groups in wide-area networks. This paper attempts to solve the above problem for groups in a hybrid network that is composed of terrestrial Ethernet LANs interconnected by ATM-based satellite channels. We investigate current group key management protocols, and design a framework for secure and scal able key management for the multicast routing architecture in the satellite net work. The proposed framework is presented in detail, alongwith analysis and simulation results.
Chapter PDF
References
Armitage, G. (1997). “IP Multicasting over ATM Networks”. IEEE Journal on Selected Areas in Communications, 15(3):445–157.
Berkovits, S. (1991). “How To Broadcast A Secret”. Advances in Cryptology — EUROCRYPT ’91, Lecture Notes in Computer Science, LNCS, 547:535–541.
Burmester, M. and Desmedt, Y. (1994). “A Secure and Efficient Conference Key Distribution System”. Advances in Cryptology — EUROCRYPT ’94, Lecture Notes in Computer Science.
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., and Pinkas, B. (1999). “Multicast Security: A Taxonomy and Some Efficient Constructions”. Proceedings oflNFOCOMM ’99.
Chiou, G. and Chen, W. (1989). “Secure Broadcasting Using the Secure Lock”. IEEE Transac tions on Software Engineering, 15(8).
Deering, S.E., Estrin, D., Farinacci, D., Jacobson, V., Liu, C-G, and Wei, L. (1996). “The PIM Architecture for Wide-Area Multicast Routing”. IEEE/ACM Transactions on Networking, 4(2):153–162.
Fiat, A. and Naor, M. (1994). “Broadcast Encryption”. Advances in Cryptology — CRYPTO ’93, Lecture Notes in Computer Science, LNCS, 773:480–491.
Harney, H. and Muckenhirn, C. (1997). “Group Key Management Protocol (GKMP) Architec ture”. Internet RFC 2094.
Kim, K. S., Kim, S. J., and Won, D. H. (1996). “Conditional Access System Using Smart Card”. Proc. ofJCCl’96, The 6th Joint Conference on Communication and Information, pages 180–183.
Matsumoto, T. and Imai, H. (1988). “On the KEY PREDISTRIBUTION SYSTEM: A Partical Solution to the Key Distribution Problem”. Advances in Cryptology — CRYPTO ’87, Lecture Notes in Computer Science, LNCS, 293:185–193.
Mittra, S. (1997). “Iolus: A Framework for Scalable Secure Multicasting”. In Proceedings of ACMSIGCOMM’97, pages 277–288.
Opnet (2002). Opnet Modeler 9.0. http://www.opnet.com/products/modeler/home.html.
Perrig, A., Song, D., and Tygar, J.D. (2001). “ELK, a New Protocol for Efficient Large-Group Key Distribution”. Proceedings of IEEE Security and Privacy Symposium S& P2001.
Poovendran, R. (1999). “Key Management for Secure Multicast Communication”. PhD thesis, University of Maryland College Park.
Rodeh, O., Birman, K., and Dolev, D. (2000). “Optimized Group Rekey for Group Commu nication Systems”. Proceedings of Network and Distributed System Security Symposium (NDSS’00).
Roy-Chowdhury, A. (2003). “IP Routing and Key Management for Secure Multicast in Satellite ATM Networks”. Master’s thesis, Univeristy of Maryland College Park.
Steer, D., Strawczynski, L., Diffie, W, and Wiener, M. (1990). “A Secure Audio Teleconference System”. Advances in Cryptology — CRYPTO ’88, Lecture Notes in Computer Science, LNCS, 403:520–528.
Steiner, M., Tsudik, G., and Waidner, M. (2000). “Key Agreement in Dynamic Peer Groups”. IEEE Transactions on Parallel and Distributed Systems, 11(8):769–780.
Wallner, D., Harder, E., and Agée, R. (1999). “Key Management for Multicast: Issues and Ar chitectures”. Internet RFC 2627.
Wong, C. K., Gouda, M., and Lam, S. S. (2000). “Secure Group Communications Using Key Graphs”. IEEE/ACM Transactions on Networking, 8(1): 16–30.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Roy-Chowdhury, A., Baras, J.S. (2004). Key Management for Secure Multicast in Hybrid Satellite Networks. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_35
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_35
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive