Key Management for Secure Multicast over IPv6 Wireless Networks
© W. Aye and M. U. Siddiqi 2006
Received: 26 September 2005
Accepted: 17 May 2006
Published: 17 July 2006
Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.
- Goncalves M, Niles K: Multicasting overview. In IP Multicasting: Concepts and Application. McGraw-Hill, New York, NY, USA; 1999:91–117.Google Scholar
- Vida R, Costa, Eds L: Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004.View ArticleGoogle Scholar
- Jia X: A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks. IEEE/ACM Transactions on Networking 1998,6(6):828–837. 10.1109/90.748092View ArticleGoogle Scholar
- Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S: Construction of an efficient overlay multicast infrastructure for real-time applications. Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1521–1531.
- Varshney U: Multicast over wireless networks. Communications of the ACM 2002,45(12):31–37. 10.1145/585597.585598View ArticleGoogle Scholar
- Baugher M, Canetti R, Dondeti L, Lindholm F: Multicast Security (MSEC) Group Key Management Architecture. Requests For Comments—4046, 2005
- Perkins C: IP Mobility Support. (Request for Comments—2002), IETF Network working group, 1996
- Bruschi D, Rosti E: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications 2002,7(6):503–511. special issue on multipoint communication in wireless mobile networks 10.1023/A:1020781305639View ArticleGoogle Scholar
- Karygiannis T, Owens L: Wireless network security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication 800–48, 2002, http://csrc.nist.gov/publications/nistpubs/800–48/NIST_SP_800–48.pdf NIST Special Publication 800-48, 2002,
- Sun L, Liao Y, Zheng J, Yichuan W, Ma J: An efficient multicast protocol in mobile IPv6 networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '04), March 2004, Atlanta, Ga, USA 1: 155–159.
- Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. ACM Communication 1978,21(2):120–126. 10.1145/359340.359342MATHMathSciNetView ArticleGoogle Scholar
- Johnson D, Menezes A: The elliptic curve digital signature algorithm (ECDSA). In Tech. Rep. 99–34. University of Waterloo, Canada; 1999. http://www.cacr.math.uwaterloo.caGoogle Scholar
- Rivest R: The MD5 Message-Digest Algorithm. 1992.View ArticleGoogle Scholar
- Vida R, Costa E: Multicast Listener Discovery Version 2 (MLD) for IPv6. 2004.Google Scholar
- Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B: The versakey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 1999,17(9):1614–1631. 10.1109/49.790485View ArticleGoogle Scholar
- Stallings W: Cryptography and Network Security, Principles and Practice. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1999.Google Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.