Multimedia Broadcast/Multicast Service (MBMS)

Slides:



Advertisements
Similar presentations
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Advertisements

VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Mobile Communication MMS.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Signaling Measurements on the Packet Domain of 3G-UMTS Core Network G. Stephanopoulos (National Technical University of Athens, Greece) G. Tselikis (4Plus.
IP Multimedia Subsystem (IMS) 江培文. Agenda Background IMS Definition IMS Architecture IMS Entities IMS-CS Interworking.
Telefónica Móviles España GPRS (General Packet Radio Service)
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Maryam Hamidirad CMPT  Introduction  Power Counting Mechanism  Proposed Algorithm  Results  Conclusion  Future Work 2.
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
1 CDMA/GPRS Roaming Proposals Raymond Hsu, Jack Nasielski Feb
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Wireless and Security CSCI 5857: Encoding and Encryption.
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
QoS Design for 3G Networks
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Secure Group Communication: Key Management by Robert Chirwa.
Device-to-Device Communication as an Underlay to LTE-Advanced Networks
T Multimedia Seminar Carlos Herrero55828H Osmo Tolvanen46958L.
QoS Multicasting over Mobile Networks IEEE Globecom 2005 Reporter : Hsu,Ling-Chih.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Device-to-Device Communication in Cellular Networks Speaker: Tsung-Han Chiang Date: Feb. 24,
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Multicasting Part I© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
1 © NOKIA Functionality and Testing of Policy Control in IP Multimedia Subsystem Skander Chaichee HUT/Nokia Networks Supervisor: Professor Raimo.
IEEE Communications Magazine February 2006 Stefan Parkvall, Eva Englund, Magnus Lundevall, and Johan Torsner, Ericsson Research 2015/12/31.
Lecture 24 Wireless Network Security
Architectural Design of a Multi- Agent System for handling Metadata streams Don Cruickshank, Luc Moreau, David De Roure Department of Electronics and Computer.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Admission Control in IP Multicast over Heterogeneous Access Networks
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
1 SAMSUNG BCMCS Security Architecture and Key Management JUNHYUK SONG SAMSUNG Incorporated grants a free, irrevocable license to 3GPP2 and its Organization.
QoS JEM Input from TSG-S All-IP ad-hoc AllIP
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
1 Special Topics in Computer Engineering Supervised by Dr. Walid Abu-Sufah Jordan University Department of Computer Engineering.
1 Wireless Networks Lecture 21 WCDMA (Part I) Dr. Ghalib A. Shah.
MBMS in GSM Evolution Systems – A Research Paper Magesh Annamalai – FAU Feeds – Grad Student Sr.Systems Engineer - Location Technology Group T - Mobile.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003.
IEEE : High-rate WPAN Overview
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
Instructor Materials Chapter 6 Building a Home Network
Third Generation (3G) Cellular Network 3G System
Leoleis, G.; Dimopoulou, L.; Nikas, V.; Venieris, I.S. ISCC 2004.
SMS.
Session Initiation Protocol (SIP)
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
IP Multimedia Subsystem & W-CSCF
Application Layer Mobility Management Scheme for Wireless Internet
Thesis Work Presentation
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Presentation transcript:

Multimedia Broadcast/Multicast Service (MBMS) Computer Communications 31 (2008) 4220-4229 IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 4 Speaker: Tsung-Han Chiang Date: Feb. 15, 2012

Outline Introduction Dynamic Rekeying in 3GPP MBMS Multicast/Broadcast Services in 3GPP MBMS Architecture BM-SC Architecture MBMS Operations Mobility Management and Security Mechanism in MBMS Dynamic Rekeying in 3GPP MBMS MBMS without Dynamic Rekeying Dynamic Rekey: Logical Key Hierarchy with Height 3 Dynamic Rekey: Logical Key Hierarchy with Degree 4

Multicast/Broadcast Services in 3GPP Cell broadcast service (CBS) CBS is based on short message service (SMS) developed in GSM. It provides only text-based service. Multimedia Broadcast/Multicast Service (MBMS) It provides not only messaging services but also multimedia services. It is also compatible with Internet multicast services.

MBMS Architecture

BM-SC Architecture The BM-SC is the entry point in 3GPP network for MBMS services.

BM-SC Architecture (cont.) The membership function authorizes the UEs that want to activate MBMS services. The session and transmission function schedules the transmission of MBMS sessions. The proxy and transport function acts as a proxy agent for signaling and MBMS data between other functions and GGSN. The service announcement function announces available MBMS services. The security function distributes MBMS security keys for data integrity and confidentiality.

MBMS Operations (1/3) The broadcast mode is same except that it does not include steps (1) subscription, (3) joining, and (8) leaving.

MBMS Operations (2/3) In Step (1) subscription, users establish connection to service providers in order to receive MBMS related information. The subscription records will be kept in BM-SC. Users can find out what services are provided by Step (2) service announcement/discovery, which enables users to discover the range and capability of the MBMS content providers. If a mobile station is interested in the service, it will subscribe to the service by using Step (3) joining, which establish signaling connections between the UE and the core network. The UE will send IGMP join message in the activated PDP context to GGSN.

MBMS Operations (3/3) Step (4) session start will establish the necessary data bearer. The process is initiated by BM-SC when BM-SC is ready to send MBMS data. The UEs then will be notified of incoming MBMS data by Step (5) MBMS notification. After that, MBMS data is transmitted, which is shown as Step (6) data transfer. Step (7) session stop is invoked once the BM-SC has no data to send. After that, the related bearers are released. In Step (8) leaving, an UE will send IGMP leave message to the serving GGSN if the UE initiates the leaving process.

Mobility Management and Security Mechanism in MBMS Because mobility management in the original 3GPP PS domain is well defined, the mobility management in MBMS is combined with the one developed in 3GPP PS domain. Unlike mobility management, the security mechanisms developed in the original 3GPP PS domain cannot meet the requirements of the MBMS services. Therefore, 3GPP has developed specific security techniques for MBMS, including authentication, key distribution, and MBMS data protection.

Mobility Management and Security Mechanism in MBMS Both BM-SC and UE own the following keys. MBMS Request Key (MRK): It is mainly used for authentication. MBMS User Key (MUK): It is used to protect the distribution of MSK. MBMS Service Key (MSK): It is used to protect a certain MBMS session. It is also used to protect the distribution of MTK. MBMS Traffic Key (MTK): It is used to encrypt/decrypt MBMS traffic

MBMS without Dynamic Rekeying The KS (BM-SC) and all group members share the same MTK and MSK. The KS also shares the MUK and MRK with each individual user. When a user joins the multicast group, the degree of the key tree is increased.

Dynamic Rekey: Logical Key Hierarchy with Height 3 As aforementioned discussion, MRK is used for authentication. MTK is used to protect the MBMS traffic. MTK is protected by MSK, which is further protected by MUK. MTK, MSK, and MUK essentially are the group key, auxiliary key, and individual key.

Dynamic Rekey: Logical Key Hierarchy with Degree 4 In prior studies, the authors have proved that to minimize rekeying cost, the degree of the key tree should be set as 4. When the number of users increases, the height of the key tree is increased.