Advertisement

Key Management for Secure Overlay Multicast

  • Jong-Hyuk Roh
  • Kyoon-Ha Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

Recently, the research focus of multicast has been put on overlay multicast. In overlay multicast, while the multicast routing, data replication and group management have been extensively studied, an important but less studied problem is security. In particular, adding confidentiality to overlay multicast is needed. To achieve confidentiality, data encryption keys are shared among the multicast group members. There is a need for key distribution scheme to solve the rekeying overhead. We introduce the key management solution called KTOM (Key Tree in Overlay Multicast). We described the operations of KTOM and compare the performance with other schemes, namely, host-to-host encryption, whole group encryption and SOT scheme.

Keywords

Overlay Multicast Secure Multicast Key Management Key hierarchy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–29 (2000)CrossRefGoogle Scholar
  2. 2.
    Yiu, W.-P.K., Chan, S.-H.G.: SOT: Secure Overlay Tree for Application Layer Multicast. In: IEEE International Conference on Communications, June 2004, vol. 3, pp. 20–24 (2004)Google Scholar
  3. 3.
    Abad, C., Gupta, I., Yurcik, W.: Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. In: IEEE International Conference on Distributed Computing Systems Workshops, June 2005, pp. 5–11 (2005)Google Scholar
  4. 4.
    Ganjam, A., Zhang, H.: Internet multicast video delivery. In: Proceedings of the IEEE, vol. 93, pp. 159–170 (2005)Google Scholar
  5. 5.
    El-Sayed, A., Roca, V., Mathy, L.: A Survey of Proposals for an Alternative Group Communication Service. In: IEEE Network, vol. 17, pp. 46–51 (2003)Google Scholar
  6. 6.
    Chan, K., Chan, S.-H.G.: Key Management Approaches to Offer Data Confidentiality for Secure Multicast. In: IEEE Network, vol. 17, pp. 30–39 (2003)Google Scholar
  7. 7.
    Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proceedings of ACM Sigcomm, pp. 277–288 (1997)Google Scholar
  8. 8.
    Francis, P.: “Yoid: Extending the Internet Multicast Architecture,” Technical Report, ACIRI (April 2000)Google Scholar
  9. 9.
    Zhang, B., Jamin, S., Zhang, L.: Host Multicast: A Framework for Delivering Multicast to End Users. In: INFOCOM, vol. 3, pp. 1366–1375 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jong-Hyuk Roh
    • 1
  • Kyoon-Ha Lee
    • 2
  1. 1.Information Security Research DivisionETRIKorea
  2. 2.Dept. of Computer Science and EngineeringInha UniversityKorea

Personalised recommendations