Skip to content


  • Research Article
  • Open Access

Key Management for Secure Multicast over IPv6 Wireless Networks

EURASIP Journal on Wireless Communications and Networking20062006:061769

  • Received: 26 September 2005
  • Accepted: 17 May 2006
  • Published:


Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.


  • Wireless Network
  • Mobile Host
  • Distribution Scheme
  • Multicast Group
  • Transmission Bandwidth


Authors’ Affiliations

Faculty of Information Technology, Multimedia University, Jalan Multimedia, Cyberjaya, Selangor, 63100, Malaysia
Faculty of Engineering, International Islamic University Malaysia, Jalan Gombak, Kuala Lumpur, 53100, Malaysia


  1. Goncalves M, Niles K: Multicasting overview. In IP Multicasting: Concepts and Application. McGraw-Hill, New York, NY, USA; 1999:91–117.Google Scholar
  2. Vida R, Costa, Eds L: Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004.View ArticleGoogle Scholar
  3. Jia X: A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks. IEEE/ACM Transactions on Networking 1998,6(6):828–837. 10.1109/90.748092View ArticleGoogle Scholar
  4. Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S: Construction of an efficient overlay multicast infrastructure for real-time applications. Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1521–1531.Google Scholar
  5. Varshney U: Multicast over wireless networks. Communications of the ACM 2002,45(12):31–37. 10.1145/585597.585598View ArticleGoogle Scholar
  6. Baugher M, Canetti R, Dondeti L, Lindholm F: Multicast Security (MSEC) Group Key Management Architecture. Requests For Comments—4046, 2005Google Scholar
  7. Perkins C: IP Mobility Support. (Request for Comments—2002), IETF Network working group, 1996Google Scholar
  8. Bruschi D, Rosti E: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications 2002,7(6):503–511. special issue on multipoint communication in wireless mobile networks 10.1023/A:1020781305639View ArticleGoogle Scholar
  9. Karygiannis T, Owens L: Wireless network security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication 800–48, 2002,–48/NIST_SP_800–48.pdf NIST Special Publication 800-48, 2002,
  10. Sun L, Liao Y, Zheng J, Yichuan W, Ma J: An efficient multicast protocol in mobile IPv6 networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '04), March 2004, Atlanta, Ga, USA 1: 155–159.Google Scholar
  11. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. ACM Communication 1978,21(2):120–126. 10.1145/359340.359342MATHMathSciNetView ArticleGoogle Scholar
  12. Johnson D, Menezes A: The elliptic curve digital signature algorithm (ECDSA). In Tech. Rep. 99–34. University of Waterloo, Canada; 1999. http://www.cacr.math.uwaterloo.caGoogle Scholar
  13. Rivest R: The MD5 Message-Digest Algorithm. 1992.View ArticleGoogle Scholar
  14. Vida R, Costa E: Multicast Listener Discovery Version 2 (MLD) for IPv6. 2004.Google Scholar
  15. Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B: The versakey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 1999,17(9):1614–1631. 10.1109/49.790485View ArticleGoogle Scholar
  16. Stallings W: Cryptography and Network Security, Principles and Practice. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1999.Google Scholar


© W. Aye and M. U. Siddiqi 2006

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.