Multicast routing in a datagram internetwork
Multicast routing in a datagram internetwork
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
An architecture for wide-area multicast routing
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
The HIP protocol for hierarchical multicast routing
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
The MASC/BGMP architecture for inter-domain multicast routing
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Secure Multicast Communications using a Key Distribution Center
Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
The Ordered Core Based Tree Protocol
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
A conference gateway supporting interoperability between SIP and H.323
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Multicast over wireless networks
Communications of the ACM
Electronic Commerce Research
A New Approach for Secure Multicast Routing in a Large Scale Network
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Scalable IP Multicast Sender Access Control for Bi-directional Trees
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
Application layer reachability monitoring for IP multicast
Computer Networks and ISDN Systems
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Offering data confidentiality for multimedia overlay multicast: Design and analysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Approximation Algorithms for Key Management in Secure Multicast
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
Application layer reachability monitoring for IP multicast
Computer Networks: The International Journal of Computer and Telecommunications Networking
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure source specific multicast for networks including mobile hosts
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Sender access and data distribution control for inter-domain multicast groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
PIMac: Multicast Access Control Implementation in PIM-SM
Wireless Personal Communications: An International Journal
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
A secure PIM-SM multicast routing protocol
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Secure multicast in micro-mobility environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Hi-index | 0.02 |
We present Keyed HIP (KHIP), a secure, hierarchical multicast routing protocol. We show that other shared-tree multicast routing protocols are subject to attacks against the multicast routing infrastructure that can isolate receivers or domains or introduce loops into the structure of the multicast routing tree. KHIP changes the multicast routing model so that only trusted members are able to join the multicast tree. This protects the multicast routing against attacks that could form branches to unauthorized receivers, prevents replay attacks and limits the effects of flooding attacks. Untrusted routers that are present on the path between trusted routers cannot change the routing and can mount no denial-of-service attack stronger than simply dropping control messages. KHIP also provides a simple mechanism for distributing data encryption keys while adding little overhead to the protocol.