Download presentation
Presentation is loading. Please wait.
Published byCori Rose Modified over 9 years ago
1
Multicast Security Issues and Solutions
2
Outline Explain multicast and its applications Show why security is needed Discuss current security implementations Explain the different ways of doing multicast Go in-depth into key management
3
What is Multicast? Unicast One-to-one communication Broadcast One-to-all communication Multicast One-to-many communication Many-to-many communication
4
Applications of Multicast Online chat groups Streaming video/audio Videoconferencing Multiplayer games
5
Need for Security Protecting trade secrets Confidential chat Government use Pay-per-view Online auctions
6
Why Security is Hard Open group membership Anyone can view or insert data into group Everyone gets same packets No individualization or customization Senders need not be members Can’t control information that goes to the group
7
Security Solutions Authentication (senders and receivers) Identify the members of the group Access control (senders and receivers) Restrict membership Restrict who can send data Key management Provide confidentiality and integrity Fingerprinting Make each receiver’s data unique
8
IP vs. Application-Layer Multicast IP Multicast Network supported Minimum traffic Least control over access Application-Layer Multicast More versatile (no network support required) Full control over the group More network overhead
9
Group Key Management Basic schemes GKMP, SMKD Hierarchical schemes Iolus, Logical Key Hierarchy Batch schemes MARKS Trade-off schemes CVA, HySOR
10
Basic Key Distribution Single group key Pair-wise distribution Slow Non-scalable
11
Hierarchical Key Distribution Logical groups Central management Tree structure Isolation of keying Node hierarchies Sub-group managers
12
Batch Rekeying Reduce rekey operations Less overhead Sacrifice forward/backward secrecy
13
New Approach No group key Arbitrary message key Personal keys for each node Key encryption keys
14
New Approach Extreme hierarchical case Sub-group size of 1 Rekey isolation Take advantage of inherent topology
15
How it Works Certificates Personal keys Message keys Join/Leave operations
16
Advantages Highly scalable Fast rekey operations Low message overhead
17
Remaining Issues Vulnerable to Denial of Service Performance dependent on the overlay topology
18
Takeaway Points Wide range of applications Many require security Current approaches are insufficient Need a usable key management scheme
19
Resources http://www.cs.virginia.edu/~mngroup http://www.securemulticast.org/
20
References Paul Judge and Mostafa Ammar, Security Issues and Solutions in Multicast Content Distribution: A Survey, IEEE Network. January/February 2003. Germano Caronni, M.W., Dan Sun, Bernhard Plattner, Efficient Security for Large and Dynamic Multicast Groups. in IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, (1998). Guang-Huei Chiou, W.-T.C. Secure Broadcasting Using the Secure Lock. IEEE Transactions on Software Engineering, 15 (8). Suvo Mittra Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM '97. September 1997.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.