Abstract
We propose mechanisms for providing security services for source specific multicast(SSM) in networks including mobile hosts. First we categorize security requirements in SSM applications. Then we present some protocols for building multicast trees, distributing security keys, and sending messages securely in two categories of security requirements: authenticated SSM without rekeying and authenticated SSM with rekeying.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Deering: Host Extensions for IP Multicasting. IETF RFC 1112, Aug. (1989)
H. Holbrook, B. Cain: Source-Specific Multicast for IP. IETF Draft, Nov. (2001)
C. Jelger, T. Noel: Multicast for Mobile hosts in IP Networks: Progress and Challenges. IEEE Wireless Communications, Oct. (2002)
S. Mittra: Iolus: A Framework for Scalable Secure Multicasting. ACM Sigcomm Conference, (1997)
C. Wong, M. Gouda, S. Lam: Secure Group Communications using Key Graphs. ACM Sigcomm Conference, (1998)
C. Shields, J.J. Garcia-Luna-Aceves: KHIP-A Scalable Protocol for Secure Multicast Routing. ACM Sigcomm Conference, (1999)
L. Gong, N. Shacham: Multicast Security and its Extension to a Mobile Environment. Wireless Networks, (1995)
R. Shankaran, V. Varadharajan, M. Hitchens: Secure Multicast Extensions for Mobile Networks. IEEE Conference on Local Computer Networks, (1999)
D. Bruschi, E. Rosti: Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues, Mobile Networks and Applications, (2002)
N. Bhaskar, I. Kouvelas: Source-Specific Protocol Independent Multicast. IETF Draft, March (2000
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shim, YC., Park, JC. (2003). Secure Source Specific Multicast for Networks Including Mobile Hosts. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2668. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44843-8_20
Download citation
DOI: https://doi.org/10.1007/3-540-44843-8_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40161-2
Online ISBN: 978-3-540-44843-3
eBook Packages: Springer Book Archive