Advertisement

OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6

  • Youssef Baddi
  • Mohamed Dafir Ech-cherif El Kettani
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11028)

Abstract

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. This progress has motivated Internet research community to propose many multicast routing protocols to support efficiently multimedia applications such as IPTV, videoconferencing, group games. However, these multicast routing protocols doesn’t designed for mobile members and sources, and has not tested in wireless and mobile environment since they were introduced for multicast parties whose members and sources are topologically stationary. In addition, multicast applications require confidentiality for transmitted data. Traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occurs in the group and members move from one network to another. Our goal aims to support secure group communications in mobile environments. This paper presents OSM-GKM a new scheme to secure a transparent multicast communication in mobile environment based on Optimal Shared Multicast tree protocol. Its contribution is twofold: first, we evoke transparent multicast routing in mobile IPv6. Second, we present an architecture topology to transmit keys to multicast members. The paper is concluded with simulation studies, which show that our architecture achieves better performance in terms of delay, variation delay and tree cost for rekeying process.

Keywords

Multicast IP Mobile IP Key management PIM-SM 

References

  1. 1.
    Arkko, J., et al.: Enhanced route optimization for mobile IPv6 (2007). http://www.ietf.org/rfc/rfc4866.txt
  2. 2.
    Baddi, Y., et al.: Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing. In: 2013 Eighth International Conference Broadband Wireless Computing Communication Application, pp. 481–487 (2013)Google Scholar
  3. 3.
    Baddi, Y.: ybaddi/ns3-dev-pimsm dev (2018).  https://doi.org/10.5281/zenodo.1173320
  4. 4.
    Baddi, Y., Ech-Cherif El Kettani, M.D.: Key management for secure multicast communication: a survey. In: 2013 National Security Days (JNS3), pp. 1–6. IEEE (2013)Google Scholar
  5. 5.
    Baddi, Y., Ech-Cherif El Kettani, M.D.: Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 227–232. IEEE (2013)Google Scholar
  6. 6.
    Baddi, Y., Security, I.: A fast dynamic multicast tree adjustment protocol for mobile IPv6 (2014)Google Scholar
  7. 7.
    Ballardie, A.: Core based trees (CBT) multicast routing architecture (1997). http://www.ietf.org/rfc/rfc2201.txt
  8. 8.
    Ballardie, A.: Core based trees (CBT version 2) multicast routing – protocol specification –. RFC Editor, United States (1997)Google Scholar
  9. 9.
    Bouassida, M.S., et al.: Balade : diffusion multicast sécurisée d’un flux multimédia multi-sources séquentielles dans un environnement ad hoc, pp. 531–546 (2005)Google Scholar
  10. 10.
    Challal, Y., et al.: Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur Netw. 3, 2, 133 (2008)CrossRefGoogle Scholar
  11. 11.
    Challal, Y., et al.: SAKM. ACM SIGCOMM Comput. Commun. Rev. 34(2), 55 (2004)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Wong, C.K., et al.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRefGoogle Scholar
  13. 13.
    Deering, S.E.: Host extensions for IP multicasting (1986). http://www.ietf.org/rfc/rfc988.txt
  14. 14.
    Dondeti, L.R., et al.: Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23(17), 1681–1701 (2000)CrossRefGoogle Scholar
  15. 15.
    Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). (2016)Google Scholar
  16. 16.
    Fenner, B., Meyer, D.: Multicast Source Discovery Protocol (MSDP), IETF (2003)Google Scholar
  17. 17.
    Gharout, S., et al.: Adaptive group key management protocol for wireless communications. J. Univers. Comput. Sci. 18(6), 874–899 (2012)Google Scholar
  18. 18.
    Gharout, S., et al.: Scalable delay-constrained multicast group key management. Int. J. Netw. Secur. 7(2), 142–156 (2008)Google Scholar
  19. 19.
    Gupta, A.K., Gupta, A.K.: Challenges of mobile computing. In: Proceedings 2nd National Conference on Challenges and Opportunities in Information (COIT-2008), RIMT-IET, Mandi Gobindgarh, 29 March, p. 86 (2008)Google Scholar
  20. 20.
    Hardjono, T.: Router-assistance for receiver access control in PIM-SM. In: Proceedings Fifth IEEE Symposium on Computers and Communications ISCC 2000, pp. 687–692. IEEE Computer Society (2000)Google Scholar
  21. 21.
    Jelger, C., Noël, T.: Supporting mobile SSM sources for IPv6. In: Globecom 2002 IEEE Global Communication, vol. 2, pp. 1693–1697 (2002)Google Scholar
  22. 22.
    Johnson, D., et al.: RFC 3775: Mobility support in IPv6 (2004)Google Scholar
  23. 23.
    Kamat, S., et al.: Reduction in control overhead for a secure, scalable framework for mobile multicast. In: IEEE International Conference on Communications ICC 2003, pp. 98–103. IEEE (2003)Google Scholar
  24. 24.
    Kiah, M.L.M., Martin, K.M.: Host mobility protocol for secure group communication in wireless mobile environments. In: Future Generation Communication and Networking (FGCN 2007), pp. 100–107. IEEE (2007)Google Scholar
  25. 25.
    Kiah, M.L.M., et al.: Host mobility protocol for secure group communication in wireless mobile environments. Int. J. Secur. Appl. 2, 1 (2008)Google Scholar
  26. 26.
    Mapoka, T.T.: Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int. J. Comput. Appl. 84(12), 975–8887 (2013)Google Scholar
  27. 27.
    Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM 1997, pp. 277–288. ACM Press, New York (1997)Google Scholar
  28. 28.
    O’Neill, A.: Mobility management and IP multicast (2002)Google Scholar
  29. 29.
    Perkins, C., et al.: Mobility support in IPv6 (2011). http://www.ietf.org/rfc/rfc6275.txt
  30. 30.
    Romdhani, I., et al.: IP mobile multicast: challenges and solutions. IEEE Commun. Surv. Tutorials 6(1), 18–41 (2004)CrossRefGoogle Scholar
  31. 31.
    Salma, U., Lawrence, B.A.A.: A survey of group key management protocols in wireless mobile. Int. J. Innov. Res. Adv. Eng. 2(2), 2163–2349 (2015)Google Scholar
  32. 32.
    Seetha, R., Saravanan, R.: A Survey on Group Key Management Schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015)MathSciNetGoogle Scholar
  33. 33.
    Shin, Y., et al.: Video multicast over WLANs: power saving and reliability perspectives. IEEE Netw. 27(2), 40–46 (2013)CrossRefGoogle Scholar
  34. 34.
    Tangmunarunkit, H., et al.: Network topologies, power laws, and hierarchy (2001)Google Scholar
  35. 35.
    Thomson, S., et al.: IPv6 Stateless Address Autoconfiguration. Fremont, CA, USA (2007)CrossRefGoogle Scholar
  36. 36.
    Wallner, D., et al.: Key management for multicast: issues and architectures (1999). http://www.ietf.org/rfc/rfc2627.txt
  37. 37.
    Waxman, B.M.: Routing of multipoint connections. Sel. Areas Commun. IEEE J. 6(9), 1617–1622 (2002)CrossRefGoogle Scholar
  38. 38.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Youssef Baddi
    • 1
  • Mohamed Dafir Ech-cherif El Kettani
    • 2
  1. 1.ESTSB, UCD UniversityEl JadidaMorocco
  2. 2.ENSIAS Mohammed V UniversityRabatMorocco

Personalised recommendations