Abstract
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. This progress has motivated Internet research community to propose many multicast routing protocols to support efficiently multimedia applications such as IPTV, videoconferencing, group games. However, these multicast routing protocols doesn’t designed for mobile members and sources, and has not tested in wireless and mobile environment since they were introduced for multicast parties whose members and sources are topologically stationary. In addition, multicast applications require confidentiality for transmitted data. Traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occurs in the group and members move from one network to another. Our goal aims to support secure group communications in mobile environments. This paper presents OSM-GKM a new scheme to secure a transparent multicast communication in mobile environment based on Optimal Shared Multicast tree protocol. Its contribution is twofold: first, we evoke transparent multicast routing in mobile IPv6. Second, we present an architecture topology to transmit keys to multicast members. The paper is concluded with simulation studies, which show that our architecture achieves better performance in terms of delay, variation delay and tree cost for rekeying process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arkko, J., et al.: Enhanced route optimization for mobile IPv6 (2007). http://www.ietf.org/rfc/rfc4866.txt
Baddi, Y., et al.: Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing. In: 2013 Eighth International Conference Broadband Wireless Computing Communication Application, pp. 481–487 (2013)
Baddi, Y.: ybaddi/ns3-dev-pimsm dev (2018). https://doi.org/10.5281/zenodo.1173320
Baddi, Y., Ech-Cherif El Kettani, M.D.: Key management for secure multicast communication: a survey. In: 2013 National Security Days (JNS3), pp. 1–6. IEEE (2013)
Baddi, Y., Ech-Cherif El Kettani, M.D.: Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 227–232. IEEE (2013)
Baddi, Y., Security, I.: A fast dynamic multicast tree adjustment protocol for mobile IPv6 (2014)
Ballardie, A.: Core based trees (CBT) multicast routing architecture (1997). http://www.ietf.org/rfc/rfc2201.txt
Ballardie, A.: Core based trees (CBT version 2) multicast routing – protocol specification –. RFC Editor, United States (1997)
Bouassida, M.S., et al.: Balade : diffusion multicast sécurisée d’un flux multimédia multi-sources séquentielles dans un environnement ad hoc, pp. 531–546 (2005)
Challal, Y., et al.: Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur Netw. 3, 2, 133 (2008)
Challal, Y., et al.: SAKM. ACM SIGCOMM Comput. Commun. Rev. 34(2), 55 (2004)
Wong, C.K., et al.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)
Deering, S.E.: Host extensions for IP multicasting (1986). http://www.ietf.org/rfc/rfc988.txt
Dondeti, L.R., et al.: Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23(17), 1681–1701 (2000)
Fenner, B., et al.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). (2016)
Fenner, B., Meyer, D.: Multicast Source Discovery Protocol (MSDP), IETF (2003)
Gharout, S., et al.: Adaptive group key management protocol for wireless communications. J. Univers. Comput. Sci. 18(6), 874–899 (2012)
Gharout, S., et al.: Scalable delay-constrained multicast group key management. Int. J. Netw. Secur. 7(2), 142–156 (2008)
Gupta, A.K., Gupta, A.K.: Challenges of mobile computing. In: Proceedings 2nd National Conference on Challenges and Opportunities in Information (COIT-2008), RIMT-IET, Mandi Gobindgarh, 29 March, p. 86 (2008)
Hardjono, T.: Router-assistance for receiver access control in PIM-SM. In: Proceedings Fifth IEEE Symposium on Computers and Communications ISCC 2000, pp. 687–692. IEEE Computer Society (2000)
Jelger, C., Noël, T.: Supporting mobile SSM sources for IPv6. In: Globecom 2002 IEEE Global Communication, vol. 2, pp. 1693–1697 (2002)
Johnson, D., et al.: RFC 3775: Mobility support in IPv6 (2004)
Kamat, S., et al.: Reduction in control overhead for a secure, scalable framework for mobile multicast. In: IEEE International Conference on Communications ICC 2003, pp. 98–103. IEEE (2003)
Kiah, M.L.M., Martin, K.M.: Host mobility protocol for secure group communication in wireless mobile environments. In: Future Generation Communication and Networking (FGCN 2007), pp. 100–107. IEEE (2007)
Kiah, M.L.M., et al.: Host mobility protocol for secure group communication in wireless mobile environments. Int. J. Secur. Appl. 2, 1 (2008)
Mapoka, T.T.: Group key management protocols for secure mobile multicast communication: a comprehensive survey. Int. J. Comput. Appl. 84(12), 975–8887 (2013)
Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM 1997, pp. 277–288. ACM Press, New York (1997)
O’Neill, A.: Mobility management and IP multicast (2002)
Perkins, C., et al.: Mobility support in IPv6 (2011). http://www.ietf.org/rfc/rfc6275.txt
Romdhani, I., et al.: IP mobile multicast: challenges and solutions. IEEE Commun. Surv. Tutorials 6(1), 18–41 (2004)
Salma, U., Lawrence, B.A.A.: A survey of group key management protocols in wireless mobile. Int. J. Innov. Res. Adv. Eng. 2(2), 2163–2349 (2015)
Seetha, R., Saravanan, R.: A Survey on Group Key Management Schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015)
Shin, Y., et al.: Video multicast over WLANs: power saving and reliability perspectives. IEEE Netw. 27(2), 40–46 (2013)
Tangmunarunkit, H., et al.: Network topologies, power laws, and hierarchy (2001)
Thomson, S., et al.: IPv6 Stateless Address Autoconfiguration. Fremont, CA, USA (2007)
Wallner, D., et al.: Key management for multicast: issues and architectures (1999). http://www.ietf.org/rfc/rfc2627.txt
Waxman, B.M.: Routing of multipoint connections. Sel. Areas Commun. IEEE J. 6(9), 1617–1622 (2002)
ns-3 reference manual. https://www.nsnam.org/docs/release/3.9/manual.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Baddi, Y., Kettani, M.D.Ec.E. (2019). OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6. In: Podelski, A., TaĂŻani, F. (eds) Networked Systems. NETYS 2018. Lecture Notes in Computer Science(), vol 11028. Springer, Cham. https://doi.org/10.1007/978-3-030-05529-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-05529-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05528-8
Online ISBN: 978-3-030-05529-5
eBook Packages: Computer ScienceComputer Science (R0)