90 likes | 231 Views
MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL. COURSE CMSC 621. INTRODUCTION TO MULTICAST COMMUNICATIONS. Multicast takes place at the network layer It is used to distribute data to a group of members Membership is dynamic Advantages over broadcast and unicast
E N D
MULTICAST SECURITYGROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621
INTRODUCTION TO MULTICAST COMMUNICATIONS Multicast takes place at the network layer It is used to distribute data to a group of members Membership is dynamic Advantages over broadcast and unicast Over wireless it is more useful to use multicast as the information is sent only to desired recipients Disadvantage is that the data transfer is unreliable because of security issues
WHY SECURITY IS NEEDED? Dynamic entry and exit of members Authentication of the group members [2] Integrity during transmission [2] Confidentiality services for a multicast session[2]
KEYS IN MULTICAST Keys are used for encryption and decryption purpose Use of keys for secure multicast session Various protocols to create and manage keys in multicast Group Key Management Protocol for grouped symmetric keys
GKMP Experimental protocol for internet community Create grouped symmetric keys Distribute them amongst communicating peers No central key distribution site needed Only group members have the key Sender or receiver oriented operation Can make use of multicast communications protocols
GKMP FEATURES Multicast: It is used with multicast and is an advancement over centralized key management Security: It limits exposure of the key by providing high security Reliability: Group responsible for key during system failure Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Latency: Time to process requests is better as compared to centralized key distribution Extendibility: Addition of more members does not create a bottleneck
PROJECT GOALS Network security in multicast wireless networks GKMP Architecture GKMP Specification
REFERENCE [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997
REFERENCE [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra