Presentation is loading. Please wait.

Presentation is loading. Please wait.

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621.

Similar presentations


Presentation on theme: "MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621."— Presentation transcript:

1 MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621

2 INTRODUCTION TO MULTICAST COMMUNICATIONS Multicast takes place at the network layer Multicast takes place at the network layer It is used to distribute data to a group of members It is used to distribute data to a group of members Membership is dynamic Membership is dynamic Advantages over broadcast and unicast Advantages over broadcast and unicast Over wireless it is more useful to use multicast as the information is sent only to desired recipients Over wireless it is more useful to use multicast as the information is sent only to desired recipients Disadvantage is that the data transfer is unreliable because of security issues Disadvantage is that the data transfer is unreliable because of security issues

3 WHY SECURITY IS NEEDED? Dynamic entry and exit of members Dynamic entry and exit of members Authentication of the group members [2] Authentication of the group members [2] Integrity during transmission [2] Integrity during transmission [2] Confidentiality services for a multicast session[2] Confidentiality services for a multicast session[2]

4 KEYS IN MULTICAST Keys are used for encryption and decryption purpose Keys are used for encryption and decryption purpose Use of keys for secure multicast session Use of keys for secure multicast session Various protocols to create and manage keys in multicast Various protocols to create and manage keys in multicast Group Key Management Protocol for grouped symmetric keys Group Key Management Protocol for grouped symmetric keys

5 GKMP Experimental protocol for internet community Experimental protocol for internet community Create grouped symmetric keys Create grouped symmetric keys Distribute them amongst communicating peers Distribute them amongst communicating peers No central key distribution site needed No central key distribution site needed Only group members have the key Only group members have the key Sender or receiver oriented operation Sender or receiver oriented operation Can make use of multicast communications protocols Can make use of multicast communications protocols

6 GKMP FEATURES Multicast: It is used with multicast and is an advancement over centralized key management Multicast: It is used with multicast and is an advancement over centralized key management Security: It limits exposure of the key by providing high security Security: It limits exposure of the key by providing high security Reliability: Group responsible for key during system failure Reliability: Group responsible for key during system failure Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Operating expense: Additional security mechanisms are not required as compared to centralized key distribution Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Communication resources: As all the tasks are distributed no bottleneck in accessing resources. Latency: Time to process requests is better as compared to centralized key distribution Latency: Time to process requests is better as compared to centralized key distribution Extendibility: Addition of more members does not create a bottleneck Extendibility: Addition of more members does not create a bottleneck

7 PROJECT GOALS Network security in multicast wireless networks Network security in multicast wireless networks GKMP Architecture GKMP Architecture GKMP Specification GKMP Specification

8 REFERENCE [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [1]Unicast vs. Multicast over Wireless: A Cross Disciplinary Mindshare for Educational Application Researchers – Patrick Bristow [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [2]Techniques and Issues in Multicast Security – Peter S. Kruus, Joseph P. Macker. Naval Research Laboratory [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [3]RFC 2094 Group Key Management Protocol (GKMP) Architecture – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997 [4]RFC 2094 Group Key Management Protocol (GKMP) Specification – H. Harney, C. Muckenhirn. SPARTA, Inc. July 1997

9 REFERENCE [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [5]Group keys and Multicast Security in Ad Hoc Networks – Tzu-Chiang Chiang and Yueh-Min Huang. Department of Engineering Science, National Cheng-Kung University, Tainan, Taiwan. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [6]Source Routing for Overlay Multicast in Wireless Ad hoc and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King, Department of Computer Science, National Tsing Hua University. [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra [7]Multicast in Wireless Sensor Networks The next step – J. Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and F. Boavida. Department de Engenharia Informatica, Universidade de Coimbra


Download ppt "MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621."

Similar presentations


Ads by Google