Presentation is loading. Please wait.

Presentation is loading. Please wait.

Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.

Similar presentations


Presentation on theme: "Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations."— Presentation transcript:

1 Multicast Security Issues and Solutions

2 Outline Explain multicast and its applications Show why security is needed Discuss current security implementations Explain the different ways of doing multicast Go in-depth into key management

3 What is Multicast? Unicast  One-to-one communication Broadcast  One-to-all communication Multicast  One-to-many communication  Many-to-many communication

4 Applications of Multicast Online chat groups Streaming video/audio Videoconferencing Multiplayer games

5 Need for Security Protecting trade secrets Confidential chat Government use Pay-per-view Online auctions

6 Why Security is Hard Open group membership  Anyone can view or insert data into group Everyone gets same packets  No individualization or customization Senders need not be members  Can’t control information that goes to the group

7 Security Solutions Authentication (senders and receivers)  Identify the members of the group Access control (senders and receivers)  Restrict membership  Restrict who can send data Key management  Provide confidentiality and integrity Fingerprinting  Make each receiver’s data unique

8 IP vs. Application-Layer Multicast IP Multicast  Network supported  Minimum traffic  Least control over access Application-Layer Multicast  More versatile (no network support required)  Full control over the group  More network overhead

9 Group Key Management Basic schemes  GKMP, SMKD Hierarchical schemes  Iolus, Logical Key Hierarchy Batch schemes  MARKS Trade-off schemes  CVA, HySOR

10 Basic Key Distribution Single group key Pair-wise distribution Slow Non-scalable

11 Hierarchical Key Distribution Logical groups  Central management  Tree structure  Isolation of keying Node hierarchies  Sub-group managers

12 Batch Rekeying Reduce rekey operations Less overhead Sacrifice forward/backward secrecy

13 New Approach No group key Arbitrary message key Personal keys for each node  Key encryption keys

14 New Approach Extreme hierarchical case Sub-group size of 1 Rekey isolation Take advantage of inherent topology

15 How it Works Certificates Personal keys Message keys Join/Leave operations

16 Advantages Highly scalable Fast rekey operations Low message overhead

17 Remaining Issues Vulnerable to Denial of Service Performance dependent on the overlay topology

18 Takeaway Points Wide range of applications Many require security Current approaches are insufficient Need a usable key management scheme

19 Resources http://www.cs.virginia.edu/~mngroup http://www.securemulticast.org/

20 References Paul Judge and Mostafa Ammar, Security Issues and Solutions in Multicast Content Distribution: A Survey, IEEE Network. January/February 2003. Germano Caronni, M.W., Dan Sun, Bernhard Plattner, Efficient Security for Large and Dynamic Multicast Groups. in IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, (1998). Guang-Huei Chiou, W.-T.C. Secure Broadcasting Using the Secure Lock. IEEE Transactions on Software Engineering, 15 (8). Suvo Mittra Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM '97. September 1997.


Download ppt "Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations."

Similar presentations


Ads by Google