Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.2.3

Authenticated IGMP for Controlling Access to Multicast Distribution Tree  

Park, Chang-Seop (Dankook University)
Kang, Hyun-Sun (Dankook University)
Abstract
Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.
Keywords
Authenticated IGMP; Access control; DoS attack; Multicast;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Ishikawa, N. Yamanouchi, O. Takahashi, 'IGMP Extension for Authentication of IP Multicast,' Internet Draft, draft-ishikawaigmp-auth-01.txt, Aug. 1998
2 R. M. Needham and M. D. Schroeder, 'Using Encryption for Authentication in Large Networks of Computers,' Communications of the ACM, vol.21, 1978, pp. 993-999   DOI   ScienceOn
3 M. Baugher, B. Weis, T. Hardjono, H. Harney, 'The Group Domain of Interpretation,' RFC 3547, July 2003
4 T. Hayashi, H. He, H. Satou, H. Ohta, S. Vaidya, 'Accounting, Authentication and Authorization Issues in Managed IP Multicasting Services', Internet Draft, draft-hayashi-maccnt-02.txt, Feb. 2005
5 C. Castelluccia and G. Montenegro, 'Securing Group Management in IPv6 withCryptographically Based Addresses,' Proc. 8th IEEE International Symposium on Computer andCommunication, Turkey, July 2003, pp. 588-93
6 T. Hardjono and B. Cain 'Key Establishment for IGMP Authentication in IPECUMN,' France, Oct. 2000, pp. 247-52
7 B. Coan, V. Kaul, S. Narain, W. Stephens, 'HASM: Hierachical Application-Level Secure Multicast,' Internet Draft, draft-coan-hasm-00.txt, Nov. 2001
8 H. He, T. Hardjono, and B. Cain, 'Simple Multicast Receiver Access Control,' Internet draft, draft-irtf-gsec-smrac-00.txt, Nov. 2001
9 L. Gong and N. Shacham, 'Elements of trusted multicasting,' in Proceedings of2nd ACM Conference on Computer and Communications Security, Fairfax,1994, pp. 176-183
10 M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, 'Multicast Security (MSEC) Group Key Management Architecture,' RFC 4046, Apr. 2005
11 N. Yamanouchi, N. Ishikawa, Takahashi, 'RADIUS Extension for Multicast Router Authentication,' Internet Draft, draft-yamanouchi-radius-ext-00.txt, Mar. 1998
12 W. Fenner, 'Internet Group Management Protocol, Version 2,' RFC 2236, Nov
13 T. Hayashi, D. Andou, H. He, W. Tawbi, and T. Niki, 'IGMP for user Authentication Protocol (IGAP),' Internet Draft, draft-hayashi-igap-00.txt, Oct. 2002
14 L. Lamport, 'Password authentication with insecure communication,' Communications of the ACM, vol. 24, no.11, 1981, pp. 770-772   DOI   ScienceOn
15 P. Judge and M. Ammar, 'Gothic: A Group Access Control Architecture forMulticast and Anycast,' IEEE INFOCOM, New York, June 2002, pp. 1547-56
16 M. Handley, C. Perkins, and E. Whelan, 'Session Announcement Protocol,' RFC 2974, Oct. 2000
17 T. Hayashi, H. He, H. Satou, H. Ohta, S. Vaidya, 'Issues Related to Receiver Access Control in the Current Multicast Protocols,' Internet Draft, draft-ietf-mboned-rac-issues-00.txt, July 2005
18 B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan, 'InternetGroup Management Protocol, Version 3,' RFC 3376, Oct. 2002
19 H. Ueno, H. Suzuki, N. Ishikawa, and O. Takahashi, 'A Receiver Authenticationband Group Key Delivery Protocol for Secure Multicast,' IEICE Trans. onvol. E88-B, no. 3, Mar. 2005, pp. 1139-1148   DOI