Skip to main content
Top

2019 | OriginalPaper | Chapter

OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6

Authors : Youssef Baddi, Mohamed Dafir Ech-cherif El Kettani

Published in: Networked Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. This progress has motivated Internet research community to propose many multicast routing protocols to support efficiently multimedia applications such as IPTV, videoconferencing, group games. However, these multicast routing protocols doesn’t designed for mobile members and sources, and has not tested in wireless and mobile environment since they were introduced for multicast parties whose members and sources are topologically stationary. In addition, multicast applications require confidentiality for transmitted data. Traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occurs in the group and members move from one network to another. Our goal aims to support secure group communications in mobile environments. This paper presents OSM-GKM a new scheme to secure a transparent multicast communication in mobile environment based on Optimal Shared Multicast tree protocol. Its contribution is twofold: first, we evoke transparent multicast routing in mobile IPv6. Second, we present an architecture topology to transmit keys to multicast members. The paper is concluded with simulation studies, which show that our architecture achieves better performance in terms of delay, variation delay and tree cost for rekeying process.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Baddi, Y., et al.: Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing. In: 2013 Eighth International Conference Broadband Wireless Computing Communication Application, pp. 481–487 (2013) Baddi, Y., et al.: Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing. In: 2013 Eighth International Conference Broadband Wireless Computing Communication Application, pp. 481–487 (2013)
4.
go back to reference Baddi, Y., Ech-Cherif El Kettani, M.D.: Key management for secure multicast communication: a survey. In: 2013 National Security Days (JNS3), pp. 1–6. IEEE (2013) Baddi, Y., Ech-Cherif El Kettani, M.D.: Key management for secure multicast communication: a survey. In: 2013 National Security Days (JNS3), pp. 1–6. IEEE (2013)
5.
go back to reference Baddi, Y., Ech-Cherif El Kettani, M.D.: Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 227–232. IEEE (2013) Baddi, Y., Ech-Cherif El Kettani, M.D.: Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 227–232. IEEE (2013)
6.
go back to reference Baddi, Y., Security, I.: A fast dynamic multicast tree adjustment protocol for mobile IPv6 (2014) Baddi, Y., Security, I.: A fast dynamic multicast tree adjustment protocol for mobile IPv6 (2014)
8.
go back to reference Ballardie, A.: Core based trees (CBT version 2) multicast routing – protocol specification –. RFC Editor, United States (1997) Ballardie, A.: Core based trees (CBT version 2) multicast routing – protocol specification –. RFC Editor, United States (1997)
9.
go back to reference Bouassida, M.S., et al.: Balade : diffusion multicast sécurisée d’un flux multimédia multi-sources séquentielles dans un environnement ad hoc, pp. 531–546 (2005) Bouassida, M.S., et al.: Balade : diffusion multicast sécurisée d’un flux multimédia multi-sources séquentielles dans un environnement ad hoc, pp. 531–546 (2005)
10.
go back to reference Challal, Y., et al.: Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur Netw. 3, 2, 133 (2008)CrossRef Challal, Y., et al.: Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur Netw. 3, 2, 133 (2008)CrossRef
12.
go back to reference Wong, C.K., et al.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef Wong, C.K., et al.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRef
14.
go back to reference Dondeti, L.R., et al.: Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23(17), 1681–1701 (2000)CrossRef Dondeti, L.R., et al.: Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23(17), 1681–1701 (2000)CrossRef
15.
go back to reference Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). (2016) Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). (2016)
16.
go back to reference Fenner, B., Meyer, D.: Multicast Source Discovery Protocol (MSDP), IETF (2003) Fenner, B., Meyer, D.: Multicast Source Discovery Protocol (MSDP), IETF (2003)
17.
go back to reference Gharout, S., et al.: Adaptive group key management protocol for wireless communications. J. Univers. Comput. Sci. 18(6), 874–899 (2012) Gharout, S., et al.: Adaptive group key management protocol for wireless communications. J. Univers. Comput. Sci. 18(6), 874–899 (2012)
18.
go back to reference Gharout, S., et al.: Scalable delay-constrained multicast group key management. Int. J. Netw. Secur. 7(2), 142–156 (2008) Gharout, S., et al.: Scalable delay-constrained multicast group key management. Int. J. Netw. Secur. 7(2), 142–156 (2008)
19.
go back to reference Gupta, A.K., Gupta, A.K.: Challenges of mobile computing. In: Proceedings 2nd National Conference on Challenges and Opportunities in Information (COIT-2008), RIMT-IET, Mandi Gobindgarh, 29 March, p. 86 (2008) Gupta, A.K., Gupta, A.K.: Challenges of mobile computing. In: Proceedings 2nd National Conference on Challenges and Opportunities in Information (COIT-2008), RIMT-IET, Mandi Gobindgarh, 29 March, p. 86 (2008)
20.
go back to reference Hardjono, T.: Router-assistance for receiver access control in PIM-SM. In: Proceedings Fifth IEEE Symposium on Computers and Communications ISCC 2000, pp. 687–692. IEEE Computer Society (2000) Hardjono, T.: Router-assistance for receiver access control in PIM-SM. In: Proceedings Fifth IEEE Symposium on Computers and Communications ISCC 2000, pp. 687–692. IEEE Computer Society (2000)
21.
go back to reference Jelger, C., Noël, T.: Supporting mobile SSM sources for IPv6. In: Globecom 2002 IEEE Global Communication, vol. 2, pp. 1693–1697 (2002) Jelger, C., Noël, T.: Supporting mobile SSM sources for IPv6. In: Globecom 2002 IEEE Global Communication, vol. 2, pp. 1693–1697 (2002)
22.
go back to reference Johnson, D., et al.: RFC 3775: Mobility support in IPv6 (2004) Johnson, D., et al.: RFC 3775: Mobility support in IPv6 (2004)
23.
go back to reference Kamat, S., et al.: Reduction in control overhead for a secure, scalable framework for mobile multicast. In: IEEE International Conference on Communications ICC 2003, pp. 98–103. IEEE (2003) Kamat, S., et al.: Reduction in control overhead for a secure, scalable framework for mobile multicast. In: IEEE International Conference on Communications ICC 2003, pp. 98–103. IEEE (2003)
24.
go back to reference Kiah, M.L.M., Martin, K.M.: Host mobility protocol for secure group communication in wireless mobile environments. In: Future Generation Communication and Networking (FGCN 2007), pp. 100–107. IEEE (2007) Kiah, M.L.M., Martin, K.M.: Host mobility protocol for secure group communication in wireless mobile environments. In: Future Generation Communication and Networking (FGCN 2007), pp. 100–107. IEEE (2007)
25.
go back to reference Kiah, M.L.M., et al.: Host mobility protocol for secure group communication in wireless mobile environments. Int. J. Secur. Appl. 2, 1 (2008) Kiah, M.L.M., et al.: Host mobility protocol for secure group communication in wireless mobile environments. Int. J. Secur. Appl. 2, 1 (2008)
26.
go back to reference Mapoka, T.T.: Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int. J. Comput. Appl. 84(12), 975–8887 (2013) Mapoka, T.T.: Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int. J. Comput. Appl. 84(12), 975–8887 (2013)
27.
go back to reference Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM 1997, pp. 277–288. ACM Press, New York (1997) Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM 1997, pp. 277–288. ACM Press, New York (1997)
28.
go back to reference O’Neill, A.: Mobility management and IP multicast (2002) O’Neill, A.: Mobility management and IP multicast (2002)
30.
go back to reference Romdhani, I., et al.: IP mobile multicast: challenges and solutions. IEEE Commun. Surv. Tutorials 6(1), 18–41 (2004)CrossRef Romdhani, I., et al.: IP mobile multicast: challenges and solutions. IEEE Commun. Surv. Tutorials 6(1), 18–41 (2004)CrossRef
31.
go back to reference Salma, U., Lawrence, B.A.A.: A survey of group key management protocols in wireless mobile. Int. J. Innov. Res. Adv. Eng. 2(2), 2163–2349 (2015) Salma, U., Lawrence, B.A.A.: A survey of group key management protocols in wireless mobile. Int. J. Innov. Res. Adv. Eng. 2(2), 2163–2349 (2015)
32.
go back to reference Seetha, R., Saravanan, R.: A Survey on Group Key Management Schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015)MathSciNet Seetha, R., Saravanan, R.: A Survey on Group Key Management Schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015)MathSciNet
33.
go back to reference Shin, Y., et al.: Video multicast over WLANs: power saving and reliability perspectives. IEEE Netw. 27(2), 40–46 (2013)CrossRef Shin, Y., et al.: Video multicast over WLANs: power saving and reliability perspectives. IEEE Netw. 27(2), 40–46 (2013)CrossRef
34.
go back to reference Tangmunarunkit, H., et al.: Network topologies, power laws, and hierarchy (2001) Tangmunarunkit, H., et al.: Network topologies, power laws, and hierarchy (2001)
35.
go back to reference Thomson, S., et al.: IPv6 Stateless Address Autoconfiguration. Fremont, CA, USA (2007)CrossRef Thomson, S., et al.: IPv6 Stateless Address Autoconfiguration. Fremont, CA, USA (2007)CrossRef
37.
go back to reference Waxman, B.M.: Routing of multipoint connections. Sel. Areas Commun. IEEE J. 6(9), 1617–1622 (2002)CrossRef Waxman, B.M.: Routing of multipoint connections. Sel. Areas Commun. IEEE J. 6(9), 1617–1622 (2002)CrossRef
Metadata
Title
OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6
Authors
Youssef Baddi
Mohamed Dafir Ech-cherif El Kettani
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-05529-5_17

Premium Partner