An IPv6 Security Multicast System Based on CA Authentication

Article Preview

Abstract:

To deploy network components of a security multicast which is based on the multicast group security architecture and its key management architecture, an IPv6 security multicast system using CA authentication is designed. The multicast group members use CA certificate to access network, while the role of Group Controller/key Server deployed in the network is to establish and manage the group key and negotiate SA with multicast source. The proposed scheme solves the problem of components deployment of multicast system with security, and has strong scalability as well which means various multicast protocols and group management protocols can run on this system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4519-4523

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Mittra S. Iolus: A Framework for Scalable Secure Multicast[C], In pro. Of ACM SIGCOM, France: Cannes, 1997, 277~288.

DOI: 10.1145/263109.263179

Google Scholar

[2] Hardjono T, Dondeti R. Multicast and Group Security. London: Artech House Boston, (2003).

Google Scholar

[3] Yiling Wang, Phu Dung Le and and Balasubramaniam Srinivasan. Efficient Key Management for Secure Wireless Multicast[C], Third 2008 International Conference on Convergence and Hybrid Information Technology. 2008: 1131-1136.

DOI: 10.1109/iccit.2008.133

Google Scholar

[4] Wong C K, Gouda M, Lam S S. Secure Group Communications Using Key Graphs[C]. IEEE/ACM Trans. On Networking, 2000, 8(1): 16~30.

DOI: 10.1109/90.836475

Google Scholar

[5] Fucai ZHOU , Jian XU , Long LIN , Haifang XU. Multicast Key Management Scheme Based on TOFT[C], The 10th IEEE International Conference on High Performance Computing and Communications, 2008: 1130-1135.

DOI: 10.1109/hpcc.2008.90

Google Scholar

[6] Elisavet Konstantinou. Cluster-based Group Key Agreement for Wireless Ad hoc Networks[A]. The Third International Conference on Availability , Reliability And Security, 2008 550-557.

DOI: 10.1109/ares.2008.106

Google Scholar

[7] Fenner B, Handley M, Holbrook H. Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised) [S], RFC4601, IETF, (2006).

DOI: 10.17487/rfc4601

Google Scholar

[8] WU Wei, LI Xiao-jian, SHEN Ling. A Security Multicast Management System and Method[P], CHINA, CN1588839A, 2005. 3. 2.

Google Scholar