Abstract
Multicast communications introduce significant novelties both at the Network and Transport layers. The relevant applications, on the other hand, have special requirements, determined by the real-time and multimedia nature of the data and by the large number of receivers. This paper first discusses the basics of multicast routing and transport, and the concept of a multicast “session”. Then, it analyses the security services that are needed and the difficulties that arise in this context. The techniques that have been proposed for solving different multicast security problems are briefly surveyed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Manifavas, C.: Chameleon: a New Kind of Stream Cipher. In: Proc. Second Workshop on Information Hiding (1997)
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM Conf. on Communications and Computer Security (1998)
Baker, F., Lindell, B., Talwar, M.: RSVP Cryptographic Authentication. draftietf- rsvp-md5-08.txt (February 1999)
Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)
Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Data. Manuscript (February 1999)
Cain, B., Deering, S., Thyagarajan, A.: Internet Group Management Protocol, Version 3. draft-ietf-idmr-igmp-v3-01.txt (February 1999)
Canetti, R., Pinkas, B.: A Taxonomy of Multicast Security Issues. draft-canetti-secure-multicast-taxonomy-00.txt (May 1998)
Deering, S.: Host Extensions for IP Multicasting. RFC 1112 (August 1989)
Deering, S., Cheriton, D.: Multicast Routing in Datagram Internetworks and Extended LANs. ACM Transactions on Computer Systems 8(2), 85–110 (1990)
Deering, S., Estrin, D., Farinacci, D., Handley, M., Helmy, A., Jacobson, V., Liu, C., Sharma, P., Thaler, D., Wei, L.: Protocol Independent Multicast-Sparse Mode (PIM-SM): Motivation and Architecture. Draft-ietf-idmr-pim-arch-05.txt (August 1998)
Deering, S., Estrin, D., Farinacci, D., Jacobson, V., Helmy, A., Meyer, D., Wei, L.: Protocol Independent Multicast Version 2 Dense Mode Specification. Draft-ietfpim-v2-dm-01.txt (November 1998)
Estrin, D., Farinacci, D., Helmy, A., Thaler, D., Deering, S., Handley, M., Jacobson, V., Liu, C., Sharma, P., Wei, L.: Protocol Independent Multicast-Sparse Mode (PIMSM): Protocol Specification. RFC 2362 (June 1998)
Fenner, W.: Internet Group Management Protocol, Version 2. RFC 2236 (November 1997)
Floyd, S., Jacobson, V., McCanne, S., Liu, C.G., Zhang, L.: A reliable multicast framework for light-weight sessions and application level framing. In: ACM SIGCOMM 1995 (1995)
Floyd, S., Jacobson, V., McCanne, S., Liu, C.G., Zhang, L.: A Reliable Multicast Framework for Light-weight Session and Application Level framing. IEEE/ACM Transactions on Networking 5(6), 784–803 (1997)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Griwodz, C., Merkel, O., Dittmann, J., Steinmetz, R.: Protecting VoD the Easier Way. In: ACM Multimedia 1998 (1998)
Handley, M.: SAP: Session Announcement Protocol. Draft-ietf-mmusic-sap-00.txt (November 1996)
Handley, M., Crowcroft, J., Bormann, C., Ott, J.: Very large conferences on the Internet: the Internet multimedia conferencing architecture. Computer Networks 31, 191–204 (1999)
Handley, M., Jacobson, V.: SDP: Session Description Protocol. RFC 2327 (April 1998)
Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol. RFC 2543 (March 1999)
Hardman, V., Sasse, M.A., Kouvelas, I.: Successful Multiparty Audio Communication over the Internet. Communications of the ACM 41(5), 74–80 (1998)
Honeyman, P., Adamson, A., Coffman, K., Janakiraman, J., Jerdonek, R., Rees, J.: Secure Videoconferencing. In: Proc. 7th USENIX Security Symposium (1998)
Maher, M.P., Perkins, C.: Session Announcement Protocol: Version 2. Draft-ietf-mmusic-sap-v2-00.txt (November 1998)
McKnight, L.W., Bailey, J.P. (eds.): Internet Economics. MIT Press, Cambridge (1997)
Mittra, S.: Lolus: a Framework for Scalable Secure Multicast. In: ACM SIGCOMM (1997)
Paul, S., Sabnani, K.K., Lin, J.C., Bhattacharyya, S.: Reliable Multicast Transport Protocol (RMTP). IEEE Journal on Selected Areas in Communications 15(3) (April 1997)
Pusateri, T.: Distance Vector Multicast Routing Protocol. Draft-ietf-idmr-dvmrpv3-08.txt (February 1999)
Braden, E.R., Zhang, L., Berson, S., Herzog, S., Jamin, S.: Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification. RFC 2205 (September 1997)
Rizzo, L., Vicisano, L.: A Reliable Multicast data Distribution Protocol based on software FEC techniques. In: Proc. of 4th IEEE Workshop on the Architecture and Implementation of High Performance Communication Systems (HPCS 1997). Elsevier, Amsterdam (1997)
Micali, S., Even, S., Goldreich, O.: On-line/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Savetz, K., Randall, N., Lepage, Y.: MBONE: Multicasting Tomorrow’s Internet. IDG (1996)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. Draft-ietf-avt-rtp-new-03.txt (February 1999)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. RFC 1889 (January 1996)
Speakman, T., Farinacci, D., Lin, S., Tweedly, A.: PGM Reliable Transport Protocol Specification. Draft-speakman-pgm-spec-02.txt (August 1998)
Waitzman, D., Partridge, C., Deering, S.: Distance Vector Multicast Routing Protocol. RFC 1075 (November 1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bergadano, F., Cavagnino, D., Crispo, B. (2000). Issues in Multicast Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_18
Download citation
DOI: https://doi.org/10.1007/10720107_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive