Skip to main content

OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6

  • Conference paper
  • First Online:
Networked Systems (NETYS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11028))

Included in the following conference series:

  • 389 Accesses

Abstract

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. This progress has motivated Internet research community to propose many multicast routing protocols to support efficiently multimedia applications such as IPTV, videoconferencing, group games. However, these multicast routing protocols doesn’t designed for mobile members and sources, and has not tested in wireless and mobile environment since they were introduced for multicast parties whose members and sources are topologically stationary. In addition, multicast applications require confidentiality for transmitted data. Traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occurs in the group and members move from one network to another. Our goal aims to support secure group communications in mobile environments. This paper presents OSM-GKM a new scheme to secure a transparent multicast communication in mobile environment based on Optimal Shared Multicast tree protocol. Its contribution is twofold: first, we evoke transparent multicast routing in mobile IPv6. Second, we present an architecture topology to transmit keys to multicast members. The paper is concluded with simulation studies, which show that our architecture achieves better performance in terms of delay, variation delay and tree cost for rekeying process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arkko, J., et al.: Enhanced route optimization for mobile IPv6 (2007). http://www.ietf.org/rfc/rfc4866.txt

  2. Baddi, Y., et al.: Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing. In: 2013 Eighth International Conference Broadband Wireless Computing Communication Application, pp. 481–487 (2013)

    Google Scholar 

  3. Baddi, Y.: ybaddi/ns3-dev-pimsm dev (2018). https://doi.org/10.5281/zenodo.1173320

  4. Baddi, Y., Ech-Cherif El Kettani, M.D.: Key management for secure multicast communication: a survey. In: 2013 National Security Days (JNS3), pp. 1–6. IEEE (2013)

    Google Scholar 

  5. Baddi, Y., Ech-Cherif El Kettani, M.D.: Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 227–232. IEEE (2013)

    Google Scholar 

  6. Baddi, Y., Security, I.: A fast dynamic multicast tree adjustment protocol for mobile IPv6 (2014)

    Google Scholar 

  7. Ballardie, A.: Core based trees (CBT) multicast routing architecture (1997). http://www.ietf.org/rfc/rfc2201.txt

  8. Ballardie, A.: Core based trees (CBT version 2) multicast routing – protocol specification –. RFC Editor, United States (1997)

    Google Scholar 

  9. Bouassida, M.S., et al.: Balade : diffusion multicast sécurisée d’un flux multimédia multi-sources séquentielles dans un environnement ad hoc, pp. 531–546 (2005)

    Google Scholar 

  10. Challal, Y., et al.: Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur Netw. 3, 2, 133 (2008)

    Article  Google Scholar 

  11. Challal, Y., et al.: SAKM. ACM SIGCOMM Comput. Commun. Rev. 34(2), 55 (2004)

    Article  MathSciNet  Google Scholar 

  12. Wong, C.K., et al.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)

    Article  Google Scholar 

  13. Deering, S.E.: Host extensions for IP multicasting (1986). http://www.ietf.org/rfc/rfc988.txt

  14. Dondeti, L.R., et al.: Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23(17), 1681–1701 (2000)

    Article  Google Scholar 

  15. Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). (2016)

    Google Scholar 

  16. Fenner, B., Meyer, D.: Multicast Source Discovery Protocol (MSDP), IETF (2003)

    Google Scholar 

  17. Gharout, S., et al.: Adaptive group key management protocol for wireless communications. J. Univers. Comput. Sci. 18(6), 874–899 (2012)

    Google Scholar 

  18. Gharout, S., et al.: Scalable delay-constrained multicast group key management. Int. J. Netw. Secur. 7(2), 142–156 (2008)

    Google Scholar 

  19. Gupta, A.K., Gupta, A.K.: Challenges of mobile computing. In: Proceedings 2nd National Conference on Challenges and Opportunities in Information (COIT-2008), RIMT-IET, Mandi Gobindgarh, 29 March, p. 86 (2008)

    Google Scholar 

  20. Hardjono, T.: Router-assistance for receiver access control in PIM-SM. In: Proceedings Fifth IEEE Symposium on Computers and Communications ISCC 2000, pp. 687–692. IEEE Computer Society (2000)

    Google Scholar 

  21. Jelger, C., Noël, T.: Supporting mobile SSM sources for IPv6. In: Globecom 2002 IEEE Global Communication, vol. 2, pp. 1693–1697 (2002)

    Google Scholar 

  22. Johnson, D., et al.: RFC 3775: Mobility support in IPv6 (2004)

    Google Scholar 

  23. Kamat, S., et al.: Reduction in control overhead for a secure, scalable framework for mobile multicast. In: IEEE International Conference on Communications ICC 2003, pp. 98–103. IEEE (2003)

    Google Scholar 

  24. Kiah, M.L.M., Martin, K.M.: Host mobility protocol for secure group communication in wireless mobile environments. In: Future Generation Communication and Networking (FGCN 2007), pp. 100–107. IEEE (2007)

    Google Scholar 

  25. Kiah, M.L.M., et al.: Host mobility protocol for secure group communication in wireless mobile environments. Int. J. Secur. Appl. 2, 1 (2008)

    Google Scholar 

  26. Mapoka, T.T.: Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int. J. Comput. Appl. 84(12), 975–8887 (2013)

    Google Scholar 

  27. Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM 1997, pp. 277–288. ACM Press, New York (1997)

    Google Scholar 

  28. O’Neill, A.: Mobility management and IP multicast (2002)

    Google Scholar 

  29. Perkins, C., et al.: Mobility support in IPv6 (2011). http://www.ietf.org/rfc/rfc6275.txt

  30. Romdhani, I., et al.: IP mobile multicast: challenges and solutions. IEEE Commun. Surv. Tutorials 6(1), 18–41 (2004)

    Article  Google Scholar 

  31. Salma, U., Lawrence, B.A.A.: A survey of group key management protocols in wireless mobile. Int. J. Innov. Res. Adv. Eng. 2(2), 2163–2349 (2015)

    Google Scholar 

  32. Seetha, R., Saravanan, R.: A Survey on Group Key Management Schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015)

    MathSciNet  Google Scholar 

  33. Shin, Y., et al.: Video multicast over WLANs: power saving and reliability perspectives. IEEE Netw. 27(2), 40–46 (2013)

    Article  Google Scholar 

  34. Tangmunarunkit, H., et al.: Network topologies, power laws, and hierarchy (2001)

    Google Scholar 

  35. Thomson, S., et al.: IPv6 Stateless Address Autoconfiguration. Fremont, CA, USA (2007)

    Book  Google Scholar 

  36. Wallner, D., et al.: Key management for multicast: issues and architectures (1999). http://www.ietf.org/rfc/rfc2627.txt

  37. Waxman, B.M.: Routing of multipoint connections. Sel. Areas Commun. IEEE J. 6(9), 1617–1622 (2002)

    Article  Google Scholar 

  38. ns-3 reference manual. https://www.nsnam.org/docs/release/3.9/manual.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youssef Baddi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baddi, Y., Kettani, M.D.Ec.E. (2019). OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6. In: Podelski, A., TaĂŻani, F. (eds) Networked Systems. NETYS 2018. Lecture Notes in Computer Science(), vol 11028. Springer, Cham. https://doi.org/10.1007/978-3-030-05529-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05529-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05528-8

  • Online ISBN: 978-3-030-05529-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics