The Design of Multicase Key distribution Protocol based CBT(Core Based Tree)

CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계

  • Published : 2000.04.01

Abstract

Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

Keywords

References

  1. C. Semeria T. Maufer, 'Introduction to IP Multicast Routing,' , January 1997
  2. A. Ballardic, 'Scalable Multicast Key Distribution,' Request for Comments 1949, Internet Activities Board, April 1996
  3. H. Harney, C. Muckenhim, 'Group Key Management Protocol(GKMP) Specification.'Request for Comments 2093, Internet Activities Board, July 1997
  4. H. Harney, C Muckenhim, 'Group Key Management Protoco(GKMIP) Architecture,' Request for Comments 2094, Internet Activities Board. July 1997
  5. A Ballardie. 'Core Based Trce(CBT) Multicast Routing Architecture,' Request for Comments 2201, Internet Activities Board, Sept 1997
  6. A. Ballardie, 'Core Based Tree(CBT version 2) Multicast Routing-Protocol Specification,' Request for Comments 2189, Internet Activiues Board, Sept 1997
  7. T. Ballardie, J Croweroft, 'Multicast-specific security threats and counter-measure,' Proceedings of the Symposium on Network and Distributed ?System Security, San Diego, California, February 1995
  8. Thomas A, Maufer, 'Deploying IP Multicast in the Enterprise,' Prentice Hall, 1997
  9. Suvo Mittra, 'A Framework for Scalable Secure Multicasting,' In proceedings of ACM SIGCOMM '97, pp.277-288. Sept 1997
  10. G Caronni. M Waldvogel. D Sun, B. Plattner, 'Efficient Security for Large and Dynamic Multicast Group,' in the proceedings of 7th Workshop on Enabling Technologies, (WETICE '98), IEEE Computer Society Press, 1998 https://doi.org/10.1109/ENABL.1998.725721
  11. L Gong, N. Shacharn, 'Multicast Security and its extension to a mobile environment,' ACM-Baltzer Journal of Wireless Networks, October 1994 https://doi.org/10.1007/BF01200847
  12. L. Gong, N. Shacham, 'Elements of Trusted Multicasting,' Technical Report SRl-CSL-94-03, Computer Science Laboratory, SRI Internationai, Menlo Park, California, March 1994