- Research Article
- Open access
- Published:
Key Management for Secure Multicast over IPv6 Wireless Networks
EURASIP Journal on Wireless Communications and Networking volume 2006, Article number: 061769 (2006)
Abstract
Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.
References
Goncalves M, Niles K: Multicasting overview. In IP Multicasting: Concepts and Application. McGraw-Hill, New York, NY, USA; 1999:91–117.
Vida R, Costa, Eds L: Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004.
Jia X: A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks. IEEE/ACM Transactions on Networking 1998,6(6):828–837. 10.1109/90.748092
Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S: Construction of an efficient overlay multicast infrastructure for real-time applications. Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1521–1531.
Varshney U: Multicast over wireless networks. Communications of the ACM 2002,45(12):31–37. 10.1145/585597.585598
Baugher M, Canetti R, Dondeti L, Lindholm F: Multicast Security (MSEC) Group Key Management Architecture. Requests For Comments—4046, 2005
Perkins C: IP Mobility Support. (Request for Comments—2002), IETF Network working group, 1996
Bruschi D, Rosti E: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications 2002,7(6):503–511. special issue on multipoint communication in wireless mobile networks 10.1023/A:1020781305639
Karygiannis T, Owens L: Wireless network security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication 800–48, 2002, http://csrc.nist.gov/publications/nistpubs/800–48/NIST_SP_800–48.pdf NIST Special Publication 800-48, 2002,
Sun L, Liao Y, Zheng J, Yichuan W, Ma J: An efficient multicast protocol in mobile IPv6 networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '04), March 2004, Atlanta, Ga, USA 1: 155–159.
Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. ACM Communication 1978,21(2):120–126. 10.1145/359340.359342
Johnson D, Menezes A: The elliptic curve digital signature algorithm (ECDSA). In Tech. Rep. 99–34. University of Waterloo, Canada; 1999. http://www.cacr.math.uwaterloo.ca
Rivest R: The MD5 Message-Digest Algorithm. 1992.
Vida R, Costa E: Multicast Listener Discovery Version 2 (MLD) for IPv6. 2004.
Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B: The versakey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 1999,17(9):1614–1631. 10.1109/49.790485
Stallings W: Cryptography and Network Security, Principles and Practice. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1999.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Aye, W., Siddiqi, M.U. Key Management for Secure Multicast over IPv6 Wireless Networks. J Wireless Com Network 2006, 061769 (2006). https://doi.org/10.1155/WCN/2006/61769
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1155/WCN/2006/61769