Abstract
We propose a novel multicast communications model using a RingNet hierarchy, called the RingNet model, which is a combination of logical trees and logical rings for multicast communications. The RingNet hierarchy consists of four tiers: Border Router Tier (BRT), Access Gateway Tier (AGT), Access Proxy Tier (APT), and Mobile Host Tier (MHT). Within the hierarchy, the upper two tiers are dynamically organized into logical rings with network entities. In this paper, based on the RingNet model, local group concept is proposed. For simple illustration, we choose each AG in AGT as the controller of each local group. Each local group has its own independent local group key. The member’s join or leave in a local group only affects the local group, which makes multicast communications potentially scalable to very large groups. In this paper, we propose a novel key management scheme for secure multicast with the RingNet model.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 227–288 (1997)
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. In: Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, and Protocols for Computer Communication, pp. 68–79 (1998)
Setia, S.J.S., Koussih, S., Jajodia, S., Harder, E.: Kronos: A Scalable Group Re-keying Approach for Secure Multicast. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 215–228 (2000)
Zhang, X.B., Lam, S., Lee, D.Y., Yang, Y.R.: Protocol Design for Scalable and Reliable Group Rekeying. IEEE/ACM Transactions on Networking 6, 908–922 (2003)
Zhang, Q., Calvert, K.L.: On Rekey Policies for Secure Group Applications. In: Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 2003), pp. 559–564 (2003)
Lu, W.W.: Compact Multidimensional Broadband Wireless: The Convergence of Wireless Mobile and Access. IEEE Communications Magazine 38(11), 119–123 (2000)
Otsu, T., Umeda, N., Yamao, Y.: System Architecture for Mobile Communication Systems beyond IMT-2000. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2001), vol. 1, pp. 538–542 (2001)
Zahariadis, T.B., Vaxevanakis, K.G., Tsantilas, C.P., Zervos, N.A., Nikolaou, N.A.: Global Roaming in Next-Generation Networks. IEEE Communications Magazine 40(2), 145–151 (2002)
Morand, L., Tessier, S.: Global Mobility Approach with Mobile IP in all IP Networks. In: Proceedings of the 2002 IEEE International Conference on Communication (ICC 2002), vol. 4, pp. 2075–2079 (2002)
Wang, G.J., Cao, J.N., Chan, K.C.C.: A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet. In: Proceedings of the 2004 International Workshop on Mobile and Wireless Networking (MWN 2004), held in conjunction with the 33rd International Conference on Parallel Processing (ICPP 2004), Montreal, Quebec, Canada, August 15-18 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, G., Liao, L., Cao, J., Chan, K.C.C. (2004). Key Management for Secure Multicast Using the RingNet Hierarchy. In: Zhang, J., He, JH., Fu, Y. (eds) Computational and Information Science. CIS 2004. Lecture Notes in Computer Science, vol 3314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30497-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-30497-5_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24127-0
Online ISBN: 978-3-540-30497-5
eBook Packages: Computer ScienceComputer Science (R0)