Skip to main content

Issues in Multicast Security

  • Conference paper
Security Protocols (Security Protocols 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1796))

Included in the following conference series:

Abstract

Multicast communications introduce significant novelties both at the Network and Transport layers. The relevant applications, on the other hand, have special requirements, determined by the real-time and multimedia nature of the data and by the large number of receivers. This paper first discusses the basics of multicast routing and transport, and the concept of a multicast “session”. Then, it analyses the security services that are needed and the difficulties that arise in this context. The techniques that have been proposed for solving different multicast security problems are briefly surveyed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Manifavas, C.: Chameleon: a New Kind of Stream Cipher. In: Proc. Second Workshop on Information Hiding (1997)

    Google Scholar 

  2. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM Conf. on Communications and Computer Security (1998)

    Google Scholar 

  3. Baker, F., Lindell, B., Talwar, M.: RSVP Cryptographic Authentication. draftietf- rsvp-md5-08.txt (February 1999)

    Google Scholar 

  4. Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)

    Google Scholar 

  5. Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Data. Manuscript (February 1999)

    Google Scholar 

  6. Cain, B., Deering, S., Thyagarajan, A.: Internet Group Management Protocol, Version 3. draft-ietf-idmr-igmp-v3-01.txt (February 1999)

    Google Scholar 

  7. Canetti, R., Pinkas, B.: A Taxonomy of Multicast Security Issues. draft-canetti-secure-multicast-taxonomy-00.txt (May 1998)

    Google Scholar 

  8. Deering, S.: Host Extensions for IP Multicasting. RFC 1112 (August 1989)

    Google Scholar 

  9. Deering, S., Cheriton, D.: Multicast Routing in Datagram Internetworks and Extended LANs. ACM Transactions on Computer Systems 8(2), 85–110 (1990)

    Article  Google Scholar 

  10. Deering, S., Estrin, D., Farinacci, D., Handley, M., Helmy, A., Jacobson, V., Liu, C., Sharma, P., Thaler, D., Wei, L.: Protocol Independent Multicast-Sparse Mode (PIM-SM): Motivation and Architecture. Draft-ietf-idmr-pim-arch-05.txt (August 1998)

    Google Scholar 

  11. Deering, S., Estrin, D., Farinacci, D., Jacobson, V., Helmy, A., Meyer, D., Wei, L.: Protocol Independent Multicast Version 2 Dense Mode Specification. Draft-ietfpim-v2-dm-01.txt (November 1998)

    Google Scholar 

  12. Estrin, D., Farinacci, D., Helmy, A., Thaler, D., Deering, S., Handley, M., Jacobson, V., Liu, C., Sharma, P., Wei, L.: Protocol Independent Multicast-Sparse Mode (PIMSM): Protocol Specification. RFC 2362 (June 1998)

    Google Scholar 

  13. Fenner, W.: Internet Group Management Protocol, Version 2. RFC 2236 (November 1997)

    Google Scholar 

  14. Floyd, S., Jacobson, V., McCanne, S., Liu, C.G., Zhang, L.: A reliable multicast framework for light-weight sessions and application level framing. In: ACM SIGCOMM 1995 (1995)

    Google Scholar 

  15. Floyd, S., Jacobson, V., McCanne, S., Liu, C.G., Zhang, L.: A Reliable Multicast Framework for Light-weight Session and Application Level framing. IEEE/ACM Transactions on Networking 5(6), 784–803 (1997)

    Article  Google Scholar 

  16. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  17. Griwodz, C., Merkel, O., Dittmann, J., Steinmetz, R.: Protecting VoD the Easier Way. In: ACM Multimedia 1998 (1998)

    Google Scholar 

  18. Handley, M.: SAP: Session Announcement Protocol. Draft-ietf-mmusic-sap-00.txt (November 1996)

    Google Scholar 

  19. Handley, M., Crowcroft, J., Bormann, C., Ott, J.: Very large conferences on the Internet: the Internet multimedia conferencing architecture. Computer Networks 31, 191–204 (1999)

    Article  Google Scholar 

  20. Handley, M., Jacobson, V.: SDP: Session Description Protocol. RFC 2327 (April 1998)

    Google Scholar 

  21. Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol. RFC 2543 (March 1999)

    Google Scholar 

  22. Hardman, V., Sasse, M.A., Kouvelas, I.: Successful Multiparty Audio Communication over the Internet. Communications of the ACM 41(5), 74–80 (1998)

    Article  Google Scholar 

  23. Honeyman, P., Adamson, A., Coffman, K., Janakiraman, J., Jerdonek, R., Rees, J.: Secure Videoconferencing. In: Proc. 7th USENIX Security Symposium (1998)

    Google Scholar 

  24. Maher, M.P., Perkins, C.: Session Announcement Protocol: Version 2. Draft-ietf-mmusic-sap-v2-00.txt (November 1998)

    Google Scholar 

  25. McKnight, L.W., Bailey, J.P. (eds.): Internet Economics. MIT Press, Cambridge (1997)

    Google Scholar 

  26. Mittra, S.: Lolus: a Framework for Scalable Secure Multicast. In: ACM SIGCOMM (1997)

    Google Scholar 

  27. Paul, S., Sabnani, K.K., Lin, J.C., Bhattacharyya, S.: Reliable Multicast Transport Protocol (RMTP). IEEE Journal on Selected Areas in Communications 15(3) (April 1997)

    Google Scholar 

  28. Pusateri, T.: Distance Vector Multicast Routing Protocol. Draft-ietf-idmr-dvmrpv3-08.txt (February 1999)

    Google Scholar 

  29. Braden, E.R., Zhang, L., Berson, S., Herzog, S., Jamin, S.: Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification. RFC 2205 (September 1997)

    Google Scholar 

  30. Rizzo, L., Vicisano, L.: A Reliable Multicast data Distribution Protocol based on software FEC techniques. In: Proc. of 4th IEEE Workshop on the Architecture and Implementation of High Performance Communication Systems (HPCS 1997). Elsevier, Amsterdam (1997)

    Google Scholar 

  31. Micali, S., Even, S., Goldreich, O.: On-line/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)

    Google Scholar 

  32. Savetz, K., Randall, N., Lepage, Y.: MBONE: Multicasting Tomorrow’s Internet. IDG (1996)

    Google Scholar 

  33. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. Draft-ietf-avt-rtp-new-03.txt (February 1999)

    Google Scholar 

  34. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. RFC 1889 (January 1996)

    Google Scholar 

  35. Speakman, T., Farinacci, D., Lin, S., Tweedly, A.: PGM Reliable Transport Protocol Specification. Draft-speakman-pgm-spec-02.txt (August 1998)

    Google Scholar 

  36. Waitzman, D., Partridge, C., Deering, S.: Distance Vector Multicast Routing Protocol. RFC 1075 (November 1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bergadano, F., Cavagnino, D., Crispo, B. (2000). Issues in Multicast Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_18

Download citation

  • DOI: https://doi.org/10.1007/10720107_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67381-1

  • Online ISBN: 978-3-540-45570-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics