Abstract
Multicast is weaker at fabrication, denial of service, reply, repudiation, and monitoring traffic attacks than unicast or broadcast communication. In this paper, we propose the key distribution protocol which enables the secure multicast communication by getting only the group key, Key Encryption Key (KEK), and Traffic Encryption Key (TEK) using the Core Based Tree (CBT) which is able to design a more efficient security system among many multicast routing protocols. We verify the safety of proposed protocol using the Petri Net model and compare the proposed protocol with the previous method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ballardie, A.: Core Based Tree (CBT) Multicast Routing Architecture, Request for Comments 2201, Internet Activities Board (October 1997)
Ballardie, T., Crowcroft, J.: Multicast-specific security threats and counter-measure. In: Proc. of the Symposium on Network and Distributed System Security (1995)
Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient Security for Large and Dynamic Multicast Group. In: Proc. of 7th Workshop on Enabling Technologies, WETICE 1998 (1998)
Gong, L., Shacham, N.: Multicast Security and its extension to a mobile environment. ACM-Baltzer Journal of Wireless Networks ( October 1994)
Ballardie, A.: Scalable Multicast Key Distribution, Request for Comments 1949, Internet Activities Board (April 1996)
Kruus, P.S.: A Survey of multicast security issues and architectures. In: Proc. of NISSC 1998 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, B., Cho, H., Lee, J. (2004). Efficient Key Distribution Protocol for Secure Multicast Communication. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_113
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_113
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive