Skip to main content

Key Management for Secure Multicast over IPv6 Wireless Networks

Abstract

Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

[12345678910111213141516]

References

  1. Goncalves M, Niles K: Multicasting overview. In IP Multicasting: Concepts and Application. McGraw-Hill, New York, NY, USA; 1999:91–117.

    Google Scholar 

  2. Vida R, Costa, Eds L: Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004.

    Chapter  Google Scholar 

  3. Jia X: A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks. IEEE/ACM Transactions on Networking 1998,6(6):828–837. 10.1109/90.748092

    Article  Google Scholar 

  4. Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S: Construction of an efficient overlay multicast infrastructure for real-time applications. Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1521–1531.

  5. Varshney U: Multicast over wireless networks. Communications of the ACM 2002,45(12):31–37. 10.1145/585597.585598

    Article  Google Scholar 

  6. Baugher M, Canetti R, Dondeti L, Lindholm F: Multicast Security (MSEC) Group Key Management Architecture. Requests For Comments—4046, 2005

  7. Perkins C: IP Mobility Support. (Request for Comments—2002), IETF Network working group, 1996

  8. Bruschi D, Rosti E: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications 2002,7(6):503–511. special issue on multipoint communication in wireless mobile networks 10.1023/A:1020781305639

    Article  Google Scholar 

  9. Karygiannis T, Owens L: Wireless network security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication 800–48, 2002, http://csrc.nist.gov/publications/nistpubs/800–48/NIST_SP_800–48.pdf NIST Special Publication 800-48, 2002,

  10. Sun L, Liao Y, Zheng J, Yichuan W, Ma J: An efficient multicast protocol in mobile IPv6 networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '04), March 2004, Atlanta, Ga, USA 1: 155–159.

  11. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. ACM Communication 1978,21(2):120–126. 10.1145/359340.359342

    Article  MATH  MathSciNet  Google Scholar 

  12. Johnson D, Menezes A: The elliptic curve digital signature algorithm (ECDSA). In Tech. Rep. 99–34. University of Waterloo, Canada; 1999. http://www.cacr.math.uwaterloo.ca

    Google Scholar 

  13. Rivest R: The MD5 Message-Digest Algorithm. 1992.

    Chapter  Google Scholar 

  14. Vida R, Costa E: Multicast Listener Discovery Version 2 (MLD) for IPv6. 2004.

    Google Scholar 

  15. Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B: The versakey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 1999,17(9):1614–1631. 10.1109/49.790485

    Article  Google Scholar 

  16. Stallings W: Cryptography and Network Security, Principles and Practice. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Win Aye.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Aye, W., Siddiqi, M.U. Key Management for Secure Multicast over IPv6 Wireless Networks. J Wireless Com Network 2006, 061769 (2006). https://doi.org/10.1155/WCN/2006/61769

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1155/WCN/2006/61769

Keywords