1 / 9

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL. COURSE CMSC 621. INTRODUCTION TO MULTICAST COMMUNICATIONS. Multicast takes place at the network layer It is used to distribute data to a group of members Membership is dynamic Advantages over broadcast and unicast

gad
Download Presentation

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MULTICAST SECURITYGROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621

  2. INTRODUCTION TO MULTICAST COMMUNICATIONS Multicast takes place at the network layer It is used to distribute data to a group of members Membership is dynamic Advantages over broadcast and unicast Over wireless it is more useful to use multicast as the information is sent only to desired recipients Disadvantage is that the data transfer is unreliable because of security issues

  3. WHY SECURITY IS NEEDED? Dynamic entry and exit of members Authentication of the group members [2] Integrity during transmission [2] Confidentiality services for a multicast session[2]

  4. KEYS IN MULTICAST Keys are used for encryption and decryption purpose Use of keys for secure multicast session Various protocols to create and manage keys in multicast Group Key Management Protocol for grouped symmetric keys

  5. GKMP Experimental protocol for internet community Create grouped symmetric keys Distribute them amongst communicating peers No central key distribution site needed Only group members have the key Sender or receiver oriented operation Can make use of multicast communications protocols

  6. GKMP FEATURES Multicast: It is used with multicast and is an advancement over centralized key management Security: It limits exposure of the key by providing high security Reliability: Group responsible for key during system failure Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Latency: Time to process requests is better as compared to centralized key distribution Extendibility: Addition of more members does not create a bottleneck

  7. PROJECT GOALS Network security in multicast wireless networks GKMP Architecture GKMP Specification

  8. REFERENCE [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997

  9. REFERENCE [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra

More Related