Abstract
The current work argues that from a security perspective there is much to be gained by employing a “secured” IP multicast at the Network layer to support the formation and management of secure conferences at the Application layer. A secured IP multicast -- with group authentication and confidentiality -- already achieves a reasonable level of security, and therefore fulfils a large part of the basic requirements of secure conferencing. If host-to-host authentication and confidentiality has been achieved through an N-to-N multicast that has been secured, then to a large extent the basic security needs of conferencing has been satisfied. What remains would be for the other conference-specific security requirements to be satisfied using methods which are particular to a given conference scheme, such as cheater detection/identification methods based on cryptographic techniques. In the current work we propose an architecture called the Multicast/Conference Security Architecture (MCSA) to facilitate the use of (a secured) IP multicast at the Network layer for establishing (a secured) conference at the Application layer.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35388-3_42
Chapter PDF
Similar content being viewed by others
References
Adams, C., and Farrell, S. (1998) Internet X.509 public key infrastructure certificate management protocols, March 1998. draft-ietf-pkix-ipki3cmp07.txt available at http://www.ietf.org.
Atkinson, R. (1995) Security architecture for the internet protocol. RFC 1825, IETF, August 1995.
Ballardie, T. (1996) Scalable multicast key distribution. RFC 1949, IETF, 1996.
Ballardie, T., Francis, P., and Crowcroft, J. (1993) Core based trees: An architecture for scalable inter-domain multicast routing. In Proceedings of ACM SIGCOMM’93 (San Francisco, 1993), ACM.
Chaum, D. (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (1981), 84--88.
Deering, S. (1989) Host extensions for IP multicasting. RFC 1112, IETF, 1989.
Harkins, D., and Carrel, D. (1998) The internet key exchange (IKE), March 1998. draft-ietf-ipsec-isakmp-oakley-07.txt available at http://www.ietf.org.
Harkins, D., and Doraswamy, N. (1997) A secure scalable multicast key management protocol, November 1997. draft-ietf-ipsecond-00.txt.
Harney, H., and Muckenhirn, C. (1997) Group key management protocol (GKMP) specification. RFC 2093, IETF, July 1997.
Ingemarsson, I., Tang, D. T., and Wong, C. K. (1982) A conference key distribution system. IEEE Transactions on Information Theory IT-28, 5 (1982), 714–720.
Koyama, K., and Ohta, K. (1987) Identity-based conference key distribution systems. In Advances in Cryptology–CRYPTO’87 (Lecture Notes in Computer Science No. 293) (1987), Springer-Verlag, pp. 175--184.
Maughan, D., and Schertler, M. (1997) Internet security association and key management protocol (ISAKMP), July 1997. draft-ietf-ipsec-isakmp08.txt available at http://www.ietf.org.
Mittra, S. (1997) The lolus framework for scalable secure multicasting. In Proceedings of ACM SIGCOMM’97 (1997), ACM, pp. 277--288.
Moy, J. (1994) Multicast extensions to OSPF. RFC 1584, IETF, 1994.
Simmons, G. J. (1992) An introduction to shared secret andor shared control schemes and their application. In Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons, Ed. IEEE Press, 1992, pp. 441--497.
Steiner, M., Tsudik, G., and Waidner, M. (1996) Diffie-Hellman key distribution extended to group communications. In Proceedings of the 3rd ACM Conference on Computer and Communications Security (New Delhi, March 1996), ACM.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hardjono, T., Doraswamy, N., Cain, B. (1998). An Architecture for Conference-Support using Secured Multicast. In: van As, H.R. (eds) High Performance Networking. HPN 1998. IFIP — The International Federation for Information Processing, vol 8. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35388-3_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-35388-3_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5397-4
Online ISBN: 978-0-387-35388-3
eBook Packages: Springer Book Archive