GROUP KEY MANAGEMENT PROTOCOL by 37p5jxgU

VIEWS: 5 PAGES: 9

									 MULTICAST SECURITY
GROUP KEY MANAGEMENT
      PROTOCOL
    COURSE CMSC 621
 INTRODUCTION TO MULTICAST
      COMMUNICATIONS

Multicast   takes place at the network layer

It   is used to distribute data to a group of members

Membership     is dynamic

Advantages    over broadcast and unicast

Over wireless it is more useful to use multicast as the
information is sent only to desired recipients

Disadvantage is that the data transfer is unreliable
because of security issues
     WHY SECURITY IS NEEDED?

Dynamic     entry and exit of members

Authentication    of the group members [2]

Integrity   during transmission [2]

Confidentiality   services for a multicast session[2]
              KEYS IN MULTICAST

Keys   are used for encryption and decryption purpose

Use   of keys for secure multicast session

Various   protocols to create and manage keys in multicast

Group   Key Management Protocol for grouped symmetric
keys
                        GKMP

Experimental   protocol for internet community

Create   grouped symmetric keys

Distribute   them amongst communicating peers

No   central key distribution site needed

Only   group members have the key

Sender   or receiver oriented operation

Can   make use of multicast communications protocols
                   GKMP FEATURES

Multicast:It is used with multicast and is an advancement
over centralized key management

Security:   It limits exposure of the key by providing high
security

Reliability:   Group responsible for key during system failure

Operating  expense: Additional security mechanisms are not
required as compared to centralized key distribution

Communication   resources: As all the tasks are distributed
no bottleneck in accessing resources.

Latency:  Time to process requests is better as compared to
centralized key distribution

Extendibility:   Addition of more members does not create a
bottleneck
                PROJECT GOALS


Network   security in multicast wireless networks

GKMP   Architecture

GKMP   Specification
                   REFERENCE

[1]Unicast  vs. Multicast over Wireless: A Cross
Disciplinary Mindshare for Educational Application
Researchers – Patrick Bristow

[2]Techniques   and Issues in Multicast Security – Peter
S. Kruus, Joseph P. Macker. Naval Research Laboratory

[3]RFC2094 Group Key Management Protocol
(GKMP) Architecture – H. Harney, C. Muckenhirn.
SPARTA, Inc. July 1997

[4]RFC2094 Group Key Management Protocol
(GKMP) Specification – H. Harney, C. Muckenhirn.
SPARTA, Inc. July 1997
                    REFERENCE

[5]Group keys and Multicast Security in Ad Hoc Networks –
Tzu-Chiang Chiang and Yueh-Min Huang. Department of
Engineering Science, National Cheng-Kung University,
Tainan, Taiwan.

[6]Source  Routing for Overlay Multicast in Wireless Ad hoc
and Sensor Networks – Chi-Kuo Chiang and Chung-Ta King,
Department of Computer Science, National Tsing Hua
University.

[7]Multicast in Wireless Sensor Networks The next step – J.
Sa Silva, T. Camilo, A.Rodrigues, M.Silva, F. Gaudencio and
F. Boavida. Department de Engenharia Informatica,
Universidade de Coimbra

								
To top