Multicast Security CSCE 6581 Advanced Computer Networks Vandana Gunupudi Chen Peng Avanthi Koneru.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
A Survey of Key Management for Secure Group Communications Celia Li.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Multicast Integrated Network Services Almerindo Graziano.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Gothic : A Group Access Control Architecture for Secure Multicast and Anycast Paul Judge, Mostafa Ammar Georgia Institute of Technology Presenters: Dheeraj.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.
VoIP and IP conferencing over satellites Workshop on VoIP Technology: Research and Standards for reliable applications PIMRC 08, Cannes France 15 September.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Study of the Relationship between Peer-to-Peer Systems and IP Multicasting T. Oh-ishi, K. Sakai, K. Kikuma, and A. Kurokawa NTT Network Service Systems.
Multicast Communication
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Network Security Sorina Persa Group 3250 Group 3250.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Group Management n Introduction n Internet Group Management Protocol (IGMP) n Multicast Listener Discovery (MLD) protocol.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Multicast Security Cryptographic Protocols InKwan Yu.
An IPSec-based Host Architecture for Secure Internet Multicast R. Canetti, P-C. Cheng, F.Giraud, D. Pendarakis, J.R. Rao, P. Rohatgi, IBM Research D. Saha.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2010 Dr. Hiroshi Fujinoki CS 547/490 Network.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Secure Group Communication: Key Management by Robert Chirwa.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
APPLICATION LAYER MULTICASTING
Kerberos Guilin Wang School of Computer Science 03 Dec
Efficient and Secure Source Authentication for Multicast 報告者 : 李宗穎 Proceedings of the Internet Society Network and Distributed System Security Symposium.
Security for Broadcast Network
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Chapter 6 outline r 6.1 Multimedia Networking Applications r 6.2 Streaming stored audio and video m RTSP r 6.3 Real-time, Interactive Multimedia: Internet.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
RTP Functionalities for RTCWEB A combined view from the authors of draft-cbran-rtcweb-media-00 draft-cbran-rtcweb-media-00 draft-perkins-rtcweb-rtp-usage-02.
K. Salah1 Security Protocols in the Internet IPSec.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Group Communications: Host Group and IGMP Dr. Rocky K. C. Chang 19 March, 2002.
Introduction Wireless devices offering IP connectivity
Zueyong Zhu† and J. William Atwood‡
Multicast Outline Multicast Introduction and Motivation DVRMP.
The Open System Interconnection (OSI) Model & Network Protocols.
Design and Implementation of SUPnP Networks
Advanced Computer Networks
Presentation transcript:

Multicast Security CSCE 6581 Advanced Computer Networks Vandana Gunupudi Chen Peng Avanthi Koneru

Agenda Introduction Applications Multicast Service Model Security Issues Background and Requirements Benchmarks and Metrics Summary of methods Conclusion Avanthi Peng Vandana

What is Multicasting? Unicast is conventional single point-to-point communication. Broadcast is transmission to multiple, unspecified recipients. Multicast is communication between a single sender and multiple receivers (one- to-many) on a network or multiple senders sending to multiple receivers (many-to- many)

Multicasting Figure from Internet Protocol Multicast, Cisco Systems, available at

Multicast Applications Streaming video/audio Live TV and Radio broadcasts to the Desktop, IPTV Real-Time financial data delivery Whiteboard/Collaboration Multiplayer games File/Software downloads/updates News Feeds Multimedia phone service

Multicasting - Video Conference Ex: Network video tool, LBL video conferencing tool, Inria video conferencing system

Multicasting - Video Broadcasting Figure from The grounds-wide Tele-Tutoring System, University of Virginia, available at ● gwTTS - University of Virginia tele-tutoring system (Distance Learning)

(Figure from Cisco Systems' Internetworking Technology Handbook available at )

Advantages Enhanced Efficiency: Controls network traffic and reduces server and CPU loads Optimized Performance: Eliminates traffic redundancy Distributed Applications: Makes multipoint applications possible (Figure from Introduction to IP Multicast, Cisco IP Multicast Groups, available atftp://ftpeng.cisco.com/ipmulticast/networkers03/RST1051-IntrotoIPMulticast.pdf )ftp://ftpeng.cisco.com/ipmulticast/networkers03/RST1051-IntrotoIPMulticast.pdf

Disadvantages Best Effort Delivery: Drops are to be expected. Multicast applications should not expect reliable delivery of data and should be designed accordingly. No Congestion Avoidance: Lack of TCP windowing and “slow-start” mechanisms can result in network congestion. Duplicates: Some multicast protocol mechanisms (e.g. Asserts, Registers and Shortest-Path Tree Transitions) result in the occasional generation of duplicate packets. Out-of-Sequence Packets: Various network events can result in packets arriving out of sequence.

Multicast addresses Multicasting employs a Class D address format, which ranges from to Every IP datagram whose destination address starts with "1110" is an IP Multicast datagram.

Multicast Service Model Invented by Steve Deering RFC1112 : Host Extensions for IP Multicasting Senders transmit IP datagrams to a host group “Host group” identified by a class D IP address Members of host group could be present anywhere in the Internet All members receive all packets sent to the address Open group memberships Members join and leave the group and indicate this to the routers Senders and receivers are distinct: i.e., a sender need not be a member of the group Routers listen to all multicast addresses and use multicast routing protocols to manage groups

How does a host join a group ? Internet Group Management Protocol (IGMP, RFC 3376) – Used by end hosts to signal that they want to join a specific multicast group – Used by routers to discover what groups have have interested member hosts on each network to which they are attached. – Implemented directly over IP Currently at version 3 Join and Leave messages

Multicast Properties Three main properties of multicast: – All members receive all packets sent to the address – Open group memberships – Open access to send packets to the group In order to have a secure multicast application, certain security requirements must apply to avoid the vulnerabilities.

Requirements The most basic security requirements: – Secrecy – Authenticity Other requirements include: – Anonymity – Non-repudiation – Access Control – Service Availability

Requirements Secrecy usually means that only the multicast group members (and all of them) should be able to decipher transmitted data. Group authenticity means that each group member can recognize whether a message was sent by a group member. Source authenticity means that it is possible to identify the particular sender within the group.

Requirements anonymity is to keep the identity of group members secret from outsiders or from other group members, or keep the identity of the sender of a message secret. non-repudiation is the ability of receivers of data to prove to third parties that the data has been transmitted.

Requirements Access control is the ability to make sure that only registered and legitimate parties have access to the communication addressed to the group. service availability is critical in multicast since DOS attacks are easy to mount and are much more harmful.

Requirements Figure from Paul Judge, Mostafa Ammar, “Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network Magazine, 2003.

Performance Metrics In Seminar I We talk about general performance metrics from multicast application perspective. In Seminar II we will talk about each area in detail on how to achieve the performance using different solutions and benchmarks.

Performance Metrics Performance is a major concern for multicast security applications. Major performance metrics include: – latency and work overhead per sending and receiving data packets – bandwidth overhead incurred by inflating the data packets via cryptographic transformations

Performance Metrics Other performance metrics: – Lengths of keys Ephemeral (Short-term) security: smaller key lengths Long-term security: Longer key lengths – Group management activity such as group initialization and member addition and deletion.( Time Delay in milliseconds) – Possible congestion, especially around centralized control services at peak sign-on and sign-off times.

Summary of metrics  General Metrics: – Computation overhead (depends on key lengths) ● Time to verify and decrypt data ● Time to authenticate and encrypt data – Communication bandwidth/latency overhead – Congestion  Key Management Metrics: – Key set-up and key refresh overhead – Group set-up and member enrolment time

Authentication Confidentiality Access Control ( Sender/Receiver ) Key Management Security Requirements Overview of Multicast Security

Core Problem Areas Source Authentication – TESLA Group Key Management – Many protocols – Focus on IETF standardization efforts Access Control – Receiver and Source Access Control – Focus on receiver primarily

Standardization efforts Secure Multicast Research Group (SmuG) – IRTF Working Group to discuss research issues in Multicast Security – Identify security requirements for a variety of applications – define a common and general reference framework composed of useful building blocks – Use building blocks to construct solutions for multicast security problems

Properties of Secure Multicast Preserve authentication and secrecy for all group communication Only registered senders can send packets Only registered receivers can read packets Registration means the registration by the group controller/key server Encryption/Decryption of sent packets with a shared group key Only registered senders and receivers can encrypt and decrypt the packets The group key is distributed only to the eligible senders and receivers

Source Authentication Motivating Scenario – Group of subscribers get periodic stock quotes from a server – Need to verify the identity of the sender of the stock quote Definition – Ability of members of a multicast group to verify the identity of the sender

Requirements  Authenticity  Integrity of received data  NonRepudiation  Efficiency  Communication and Computation Overhead  Collusion Resistance  Minimal Latency

Proposed Solutions Figure from Paul Judge, Mostafa Ammar, “Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network Magazine, 2003.

Source Authentication Methods Hash-based Schemes Packet Chaining Data stream partitioned into chains Each packet in chain contains hash of of the next packet in the chain Therefore, only first packet in chain is signed, saving space Tree Chaining Data stream partitioned into blocks Each block of n messages authenticated with 1 signature Nodes are message digests Receiver can recreate path

MAC-based Schemes Efficient MACS Sender holds a set of n MAC keys Receivers hold a subset of the n keys Each message “MACed” with each of the n keys and receiver verifies the MAC with the subset of keys it holds Appropriate choice of subsets Timed Efficient Stream Loss-Tolerant Authentication Protocol (TESLA) Sender signs the first packet and provides notification of a chain of MAC keys Later packets in chain reveal prior keys Synchronization required between sender/receiver Source Authentication Methods

Group Key Management (GKM) Why do we need GKM? – Data in multicast applications typically encrypted using symmetric-key cryptography – Need to protect the keys Hosts may belong to many groups with many different keys Hosts may send to many groups with different keys Support dynamic creation of groups, dynamic membership, dynamic sources

Proposed Schemes Source: Paul Judge, Mostafa Ammar, “Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network Magazine, 2003.

GKM Framework Group Key Management Framework Entities Group Controller/Key Server(GCKS) Hosts Registration Protocol When members join the group ReKey Protocol When members leave the group Types of Keys Key Encrypting Key (KEK) Traffic Encrypting Key (TEK)

IETF-proposed Standards Group Secure Association Key Management Protocol (GSAKMP) – Network layer – Distributed Architecture – One-to-many or many-to-many – Scalable Multimedia Internet Keying (MIKEY) – Targeted at real time multimedia applications – Application-layer (SRTP) – Can be tunneled over Session Initiation Protocol(SIP)

MIKEY End-to-end security of the key exchange End-to-end mutual authentication Pre-shared key, public key, signed Diffie- Hellman Suitable for unicast and small groups Simplicity Efficiency low extra bandwidth consumption low computational workload small code size Minimal number of round trips Independent of any specific security functionality of the underlying transport

Application Scenarios peer-to-peer, simple one-to-many, and small- size (interactive) groups peer-to-peer (unicast) a SIP-based call between two parties, where it may be desirable that the security is either set up by mutual agreement or that each party sets up the security for its own outgoing streams. simple one-to-many (multicast) real-time presentations, where the sender is in charge of setting up the security. many-to-many small-size interactive groups where each party may set up the security for its own outgoing media. Initiator of the group acts as the group server

Receiver Access Control Open access to distributed content on the Internet Any host can join a group using IGMP Security threats: – DoS Resource exhaustion – Eavesdropping – Theft of service Restrict access to multicast group

Receiver Access Control

Requirements Group Policy Specification Functions – Group Owner specifies a group policy Access Request Functions – Hosts requests permission to join a group Access Control Functions – Receive host's request, authenticate and then authorize

Proposed Solutions Hardjono and Cain[10]: – Access tokens to members – Authorization through Access Control Lists (ACLs)-like tokens – Token included in join request to router – Router verifies that the access-token is in the token list Ballardie and Crowcroft[12]: – Authorization servers that have ACLs distributed by an initiator – Host obtains an authorization stamp from server – Router forwards the join request to server for approval

Solutions GOTHIC[9] Comprehensive architecture for group access control Identity-based and time-limited capabilities Host requests a capability from server and forwards it to router as part of join request Router authenticates the host and verifies the capability before allowing access Integrate group access control with group key management

Conclusion Introduced multicast Discussed Security Issues Focus on core problem areas Next seminar will focus on protocols and methods that will be incorporated into the Next Generation Internet like TESLA, MIKEY

References 1. Paul Judge, Mostafa Ammar, “Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network Magazine, T. Hardjono and G. Tsudik, “IP Multicast Security: Issues and Directions''}, Annales de Telecom, July-August 2000, pp Use of TESLA in SRTP: Internet Draft: available at drafts/draft-ietf-msec-srtp-tesla-03.txthttp:// drafts/draft-ietf-msec-srtp-tesla-03.txt 4.Y. Challal, H. Bettahar, A. Bouabdallah, A taxonomy of multicast data origin authentication: issues and solutions', IEEE Communications Surveys and Tutorials 6 (3) (2004) 34—57. 5.Perrig, A., Ran Canetti, Dawn Song, and Doug Tygar, Efficient and Secure Source Authentication for Multicast ', in Proceedings of Network and Distributed System Security Symposium NDSS 2001, February R. Gennaro and P. Rohatgi, How to Sign Digital Streams ', LNCS, vol. 1294, 1997.

References 1.P. Judge, “Security and Protection Architectures for Large-Scale Content Distribution'', Ph.D. thesis, Georgia Tech, Atlanta, GA, Dec Sandro Rafaeli, David Hutchison, A survey of key management for secure group communication, ACM Comput. Surv. 35(3): M. Moyer, J. Rao, and P. Rohatgi, `A Survey of Security Issues in Multicast Communications, IEEE Network, vol. 13, Nov.-Dec. 1999, pp The Multicast Security Architecture: (RFC 3740) available at: 2. MIKEY: Multimedia Internet KEYing (RFC 3830) available at: 1. Multicast Security Group Key Management Architecture (RFC 4046) \\ available at: GSAKMP: available at 3.P. Q. Judge and M. H. Ammar, “Gothic: Group Access Control Architecture for Secure Multicast and Anycast”, IEEE INFOCOM, July T. Hardjono and B. Cain, “Key Establishment for IGMP Authentication in IP 5.Multicast'', IEEE ECUMN, CREF, Colmar, France, A. Ballardie and J.Crowcroft, “Multicast-Specific Security Threats and Countermeasures'', Proc. ISOC Symp. Net. and Distrib. Sys. Sec., San Diego, CA, Feb. 1995, pp