MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Customized Network Security Protocols Cristina Nita-Rotaru and Jeffrey Seibert SPONSORED BY DOUBLE-TAKE SOFTWARE (Jan July 2009) Department of.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments By Yair Amir, Giuseppe Ateniese, Damian Hasse, Yongdae Kim,
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
CS 582 / CMPE 481 Distributed Systems Communications.
Security Issues In Sensor Networks By Priya Palanivelu.
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Wireless Sensor Network Security Anuj Nagar CS 590.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
Condor Project Computer Sciences Department University of Wisconsin-Madison Asynchronous Notification in Condor By Vidhya Murali.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Group Key Management Protocol (GKMP) Presented By Aafreen Shaikh Course CMSC 621.
Multimedia Broadcast/Multicast Service (MBMS)
Communication (II) Chapter 4
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Secure Group Communication: Key Management by Robert Chirwa.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks Hochoong Cho, Sang-Ho Lee Mobile Telecommunication Research Division, ETRI, KOREA Younghwan.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
William Stallings Data and Computer Communications
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Ad Hoc Multicast Routing
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Security for Broadcast Network
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Computer Network Course objective: To understand Network architecture
Zueyong Zhu† and J. William Atwood‡
Telemedicine.
RTP: A Transport Protocol for Real-Time Applications
Understanding the OSI Reference Model
An Overview of the ITTC Networking & Distributed Systems Laboratory
Ch. 11 – Cipher Techniques Dr. Wayne Summers
MESSAGE PROJECT CONTRIBUTION
Chapter 1. Introduction Data Communications
Lightweight Security Scheme for Vehicle Tracking System Using CoAP
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621

INTRODUCTION TO MULTICAST COMMUNICATIONS Multicast takes place at the network layer Multicast takes place at the network layer It is used to distribute data to a group of members It is used to distribute data to a group of members Membership is dynamic Membership is dynamic Advantages over broadcast and unicast Advantages over broadcast and unicast Over wireless it is more useful to use multicast as the information is sent only to desired recipients Over wireless it is more useful to use multicast as the information is sent only to desired recipients Disadvantage is that the data transfer is unreliable because of security issues Disadvantage is that the data transfer is unreliable because of security issues

WHY SECURITY IS NEEDED? Dynamic entry and exit of members Dynamic entry and exit of members Authentication of the group members [2] Authentication of the group members [2] Integrity during transmission [2] Integrity during transmission [2] Confidentiality services for a multicast session[2] Confidentiality services for a multicast session[2]

KEYS IN MULTICAST Keys are used for encryption and decryption purpose Keys are used for encryption and decryption purpose Use of keys for secure multicast session Use of keys for secure multicast session Various protocols to create and manage keys in multicast Various protocols to create and manage keys in multicast Group Key Management Protocol for grouped symmetric keys Group Key Management Protocol for grouped symmetric keys

GKMP Experimental protocol for internet community Experimental protocol for internet community Create grouped symmetric keys Create grouped symmetric keys Distribute them amongst communicating peers Distribute them amongst communicating peers No central key distribution site needed No central key distribution site needed Only group members have the key Only group members have the key Sender or receiver oriented operation Sender or receiver oriented operation Can make use of multicast communications protocols Can make use of multicast communications protocols

GKMP FEATURES Multicast: It is used with multicast and is an advancement over centralized key management Multicast: It is used with multicast and is an advancement over centralized key management Security: It limits exposure of the key by providing high security Security: It limits exposure of the key by providing high security Reliability: Group responsible for key during system failure Reliability: Group responsible for key during system failure Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Latency: Time to process requests is better as compared to centralized key distribution Latency: Time to process requests is better as compared to centralized key distribution Extendibility: Addition of more members does not create a bottleneck Extendibility: Addition of more members does not create a bottleneck

PROJECT GOALS Network security in multicast wireless networks Network security in multicast wireless networks GKMP Architecture GKMP Architecture GKMP Specification GKMP Specification

REFERENCE [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997

REFERENCE [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra