Key Management for Secure Multicast over IPv6 Wireless Networks
<p/> <p>Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper,...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2006-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Online Access: | http://jwcn.eurasipjournals.com/content/2006/061769 |
id |
doaj-0dac851cd6f44bfa81d3d3db4a17cfbd |
---|---|
record_format |
Article |
spelling |
doaj-0dac851cd6f44bfa81d3d3db4a17cfbd2020-11-25T01:26:56ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992006-01-0120061061769Key Management for Secure Multicast over IPv6 Wireless NetworksSiddiqi Mohammad UmarAye Win<p/> <p>Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes <it>two scenarios</it> for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.</p> http://jwcn.eurasipjournals.com/content/2006/061769 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Siddiqi Mohammad Umar Aye Win |
spellingShingle |
Siddiqi Mohammad Umar Aye Win Key Management for Secure Multicast over IPv6 Wireless Networks EURASIP Journal on Wireless Communications and Networking |
author_facet |
Siddiqi Mohammad Umar Aye Win |
author_sort |
Siddiqi Mohammad Umar |
title |
Key Management for Secure Multicast over IPv6 Wireless Networks |
title_short |
Key Management for Secure Multicast over IPv6 Wireless Networks |
title_full |
Key Management for Secure Multicast over IPv6 Wireless Networks |
title_fullStr |
Key Management for Secure Multicast over IPv6 Wireless Networks |
title_full_unstemmed |
Key Management for Secure Multicast over IPv6 Wireless Networks |
title_sort |
key management for secure multicast over ipv6 wireless networks |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2006-01-01 |
description |
<p/> <p>Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes <it>two scenarios</it> for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.</p> |
url |
http://jwcn.eurasipjournals.com/content/2006/061769 |
work_keys_str_mv |
AT siddiqimohammadumar keymanagementforsecuremulticastoveripv6wirelessnetworks AT ayewin keymanagementforsecuremulticastoveripv6wirelessnetworks |
_version_ |
1725108029611835392 |