Skip to main content

Key Management for Secure Multicast Using the RingNet Hierarchy

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3314))

Abstract

We propose a novel multicast communications model using a RingNet hierarchy, called the RingNet model, which is a combination of logical trees and logical rings for multicast communications. The RingNet hierarchy consists of four tiers: Border Router Tier (BRT), Access Gateway Tier (AGT), Access Proxy Tier (APT), and Mobile Host Tier (MHT). Within the hierarchy, the upper two tiers are dynamically organized into logical rings with network entities. In this paper, based on the RingNet model, local group concept is proposed. For simple illustration, we choose each AG in AGT as the controller of each local group. Each local group has its own independent local group key. The member’s join or leave in a local group only affects the local group, which makes multicast communications potentially scalable to very large groups. In this paper, we propose a novel key management scheme for secure multicast with the RingNet model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 227–288 (1997)

    Google Scholar 

  2. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. In: Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, and Protocols for Computer Communication, pp. 68–79 (1998)

    Google Scholar 

  3. Setia, S.J.S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group Re-keying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 215–228 (2000)

    Google Scholar 

  4. Zhang, X.B., Lam, S., Lee, D.Y., Yang, Y.R.: Protocol Design for Scalable and Reliable Group Rekeying. IEEE/ACM Transactions on Networking 6, 908–922 (2003)

    Article  Google Scholar 

  5. Zhang, Q., Calvert, K.L.: On Rekey Policies for Secure Group Applications. In: Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 2003), pp. 559–564 (2003)

    Google Scholar 

  6. Lu, W.W.: Compact Multidimensional Broadband Wireless: The Convergence of Wireless Mobile and Access. IEEE Communications Magazine 38(11), 119–123 (2000)

    Article  Google Scholar 

  7. Otsu, T., Umeda, N., Yamao, Y.: System Architecture for Mobile Communication Systems beyond IMT-2000. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2001), vol. 1, pp. 538–542 (2001)

    Google Scholar 

  8. Zahariadis, T.B., Vaxevanakis, K.G., Tsantilas, C.P., Zervos, N.A., Nikolaou, N.A.: Global Roaming in Next-Generation Networks. IEEE Communications Magazine 40(2), 145–151 (2002)

    Article  Google Scholar 

  9. Morand, L., Tessier, S.: Global Mobility Approach with Mobile IP in all IP Networks. In: Proceedings of the 2002 IEEE International Conference on Communication (ICC 2002), vol. 4, pp. 2075–2079 (2002)

    Google Scholar 

  10. Wang, G.J., Cao, J.N., Chan, K.C.C.: A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet. In: Proceedings of the 2004 International Workshop on Mobile and Wireless Networking (MWN 2004), held in conjunction with the 33rd International Conference on Parallel Processing (ICPP 2004), Montreal, Quebec, Canada, August 15-18 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, G., Liao, L., Cao, J., Chan, K.C.C. (2004). Key Management for Secure Multicast Using the RingNet Hierarchy. In: Zhang, J., He, JH., Fu, Y. (eds) Computational and Information Science. CIS 2004. Lecture Notes in Computer Science, vol 3314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30497-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30497-5_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24127-0

  • Online ISBN: 978-3-540-30497-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics