MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL - PowerPoint PPT Presentation

About This Presentation
Title:

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL

Description:

MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL COURSE CMSC 621 INTRODUCTION TO MULTICAST COMMUNICATIONS Multicast takes place at the network layer It is used to ... – PowerPoint PPT presentation

Number of Views:125
Avg rating:3.0/5.0
Slides: 10
Provided by: Aafreen
Category:

less

Transcript and Presenter's Notes

Title: MULTICAST SECURITY GROUP KEY MANAGEMENT PROTOCOL


1
MULTICAST SECURITYGROUP KEY MANAGEMENT PROTOCOL
  • COURSE CMSC 621

2
INTRODUCTION TO MULTICAST COMMUNICATIONS
  • Multicast takes place at the network layer
  • It is used to distribute data to a group of
    members
  • Membership is dynamic
  • Advantages over broadcast and unicast
  • Over wireless it is more useful to use multicast
    as the information is sent only to desired
    recipients
  • Disadvantage is that the data transfer is
    unreliable because of security issues

3
WHY SECURITY IS NEEDED?
  • Dynamic entry and exit of members
  • Authentication of the group members 2
  • Integrity during transmission 2
  • Confidentiality services for a multicast
    session2

4
KEYS IN MULTICAST
  • Keys are used for encryption and decryption
    purpose
  • Use of keys for secure multicast session
  • Various protocols to create and manage keys in
    multicast
  • Group Key Management Protocol for grouped
    symmetric keys

5
GKMP
  • Experimental protocol for internet community
  • Create grouped symmetric keys
  • Distribute them amongst communicating peers
  • No central key distribution site needed
  • Only group members have the key
  • Sender or receiver oriented operation
  • Can make use of multicast communications
    protocols

6
GKMP FEATURES
  • Multicast It is used with multicast and is an
    advancement over centralized key management
  • Security It limits exposure of the key by
    providing high security
  • Reliability Group responsible for key during
    system failure
  • Operating expense Additional security mechanisms
    are not required as compared to centralized key
    distribution
  • Communication resources As all the tasks are
    distributed no bottleneck in accessing resources.
  • Latency Time to process requests is better as
    compared to centralized key distribution
  • Extendibility Addition of more members does not
    create a bottleneck

7
PROJECT GOALS
  • Network security in multicast wireless networks
  • GKMP Architecture
  • GKMP Specification

8
REFERENCE
  • 1Unicast vs. Multicast over Wireless A Cross
    Disciplinary Mindshare for Educational
    Application Researchers Patrick Bristow
  • 2Techniques and Issues in Multicast Security
    Peter S. Kruus, Joseph P. Macker. Naval Research
    Laboratory
  • 3RFC 2094 Group Key Management Protocol (GKMP)
    Architecture H. Harney, C. Muckenhirn. SPARTA,
    Inc. July 1997
  • 4RFC 2094 Group Key Management Protocol (GKMP)
    Specification H. Harney, C. Muckenhirn. SPARTA,
    Inc. July 1997

9
REFERENCE
  • 5Group keys and Multicast Security in Ad Hoc
    Networks Tzu-Chiang Chiang and Yueh-Min Huang.
    Department of Engineering Science, National
    Cheng-Kung University, Tainan, Taiwan.
  • 6Source Routing for Overlay Multicast in
    Wireless Ad hoc and Sensor Networks Chi-Kuo
    Chiang and Chung-Ta King, Department of Computer
    Science, National Tsing Hua University.
  • 7Multicast in Wireless Sensor Networks The next
    step J. Sa Silva, T. Camilo, A.Rodrigues,
    M.Silva, F. Gaudencio and F. Boavida. Department
    de Engenharia Informatica, Universidade de Coimbra
Write a Comment
User Comments (0)
About PowerShow.com