Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
A Survey of Key Management for Secure Group Communications Celia Li.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Optimal Communication Complexity of Generic Multicast Key Distribution Saurabh Panjwani UC San Diego (Joint Work with Daniele Micciancio)
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
“Scalable and Topologically-aware Application-layer Multicast” Yusung Kim Korea Advanced Institute of Science and Technology.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Gothic : A Group Access Control Architecture for Secure Multicast and Anycast Paul Judge, Mostafa Ammar Georgia Institute of Technology Presenters: Dheeraj.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Network Architecture (R02) #3 Multicast and Deployment Jon Crowcroft,
Multicast Media Streaming: Techniques for Efficiency, Security, And Copyright Protection James Logan CS 525 Dr. Chow.
Group Key Distribution Chih-Hao Huang
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Key management in wireless sensor networks Kevin Wang.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
IP Address Classes How large is the network part in an IP address? Today we use network masks to tell Originally, IP had address classes with fixed numbers.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
Multimedia Broadcast/Multicast Service (MBMS)
Multicast Security CSCE 6581 Advanced Computer Networks Vandana Gunupudi Chen Peng Avanthi Koneru.
Communication (II) Chapter 4
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Multicast Security Cryptographic Protocols InKwan Yu.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
An IPSec-based Host Architecture for Secure Internet Multicast R. Canetti, P-C. Cheng, F.Giraud, D. Pendarakis, J.R. Rao, P. Rohatgi, IBM Research D. Saha.
MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2010 Dr. Hiroshi Fujinoki CS 547/490 Network.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Data Distribution Dynamic Data Distribution. Outline Introductory Comments Dynamic (Value based) Data Distribution: HLA Data Distribution Management –Routing.
Secure Group Communication: Key Management by Robert Chirwa.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Impact of Topology on Overlay Multicast Suat Mercan.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
APPLICATION LAYER MULTICASTING
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Group Communication A group is a collection of users sharing some common interest.Group-based activities are steadily increasing. There are many types.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Group Key Distribution Xiuzhen Cheng The George Washington University.
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
1 Security for Broadcast Network Most slides are from the lecture notes of prof. Adrian Perrig.
Project Orda Secure Key Distribution Over Ad Hoc Networks Security in Ad Hoc Networks – Team A Lane Westlund, Roderic Campbell, Mark Allen, Dima Novikov,
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Securing Access to Data Using IPsec Josh Jones Cosc352.
PREPARED BY: RUMMY MIRANDA
Design and Implementation of SUPnP Networks
Other Routing Protocols
EE 122: Lecture 13 (IP Multicast Routing)
Presentation transcript:

Multicast Security Issues and Solutions

Outline Explain multicast and its applications Show why security is needed Discuss current security implementations Explain the different ways of doing multicast Go in-depth into key management

What is Multicast? Unicast  One-to-one communication Broadcast  One-to-all communication Multicast  One-to-many communication  Many-to-many communication

Applications of Multicast Online chat groups Streaming video/audio Videoconferencing Multiplayer games

Need for Security Protecting trade secrets Confidential chat Government use Pay-per-view Online auctions

Why Security is Hard Open group membership  Anyone can view or insert data into group Everyone gets same packets  No individualization or customization Senders need not be members  Can’t control information that goes to the group

Security Solutions Authentication (senders and receivers)  Identify the members of the group Access control (senders and receivers)  Restrict membership  Restrict who can send data Key management  Provide confidentiality and integrity Fingerprinting  Make each receiver’s data unique

IP vs. Application-Layer Multicast IP Multicast  Network supported  Minimum traffic  Least control over access Application-Layer Multicast  More versatile (no network support required)  Full control over the group  More network overhead

Group Key Management Basic schemes  GKMP, SMKD Hierarchical schemes  Iolus, Logical Key Hierarchy Batch schemes  MARKS Trade-off schemes  CVA, HySOR

Basic Key Distribution Single group key Pair-wise distribution Slow Non-scalable

Hierarchical Key Distribution Logical groups  Central management  Tree structure  Isolation of keying Node hierarchies  Sub-group managers

Batch Rekeying Reduce rekey operations Less overhead Sacrifice forward/backward secrecy

New Approach No group key Arbitrary message key Personal keys for each node  Key encryption keys

New Approach Extreme hierarchical case Sub-group size of 1 Rekey isolation Take advantage of inherent topology

How it Works Certificates Personal keys Message keys Join/Leave operations

Advantages Highly scalable Fast rekey operations Low message overhead

Remaining Issues Vulnerable to Denial of Service Performance dependent on the overlay topology

Takeaway Points Wide range of applications Many require security Current approaches are insufficient Need a usable key management scheme

Resources

References Paul Judge and Mostafa Ammar, Security Issues and Solutions in Multicast Content Distribution: A Survey, IEEE Network. January/February Germano Caronni, M.W., Dan Sun, Bernhard Plattner, Efficient Security for Large and Dynamic Multicast Groups. in IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, (1998). Guang-Huei Chiou, W.-T.C. Secure Broadcasting Using the Secure Lock. IEEE Transactions on Software Engineering, 15 (8). Suvo Mittra Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM '97. September 1997.