Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Key Management Framework for IP Multicast Infrastructure Security
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Scalable IP Multicast Sender Access Control for Bi-directional Trees
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Distance education and on-line universities
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Robustness to inflated subscription in multicast congestion control
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Key management for high bandwidth secure multicast
Journal of Computer Security
Design of multicast protocols robust against inflated subscription
IEEE/ACM Transactions on Networking (TON)
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
AuthoCast: a protocol for mobile multicast sender authentication
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Dr. Multicast: Rx for data center communication scalability
LADIS '08 Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware
Securing hierarchical multicast communications using roles
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Journal of Systems and Software
Sender access and data distribution control for inter-domain multicast groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
A role-based protocol for secure multicast communications in mobile ad hoc networks
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
PIMac: Multicast Access Control Implementation in PIM-SM
Wireless Personal Communications: An International Journal
Securing MANET multicast using DIPLOMA
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Distributed group access control architecture for secure multicast
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Scalable secure one-to-many group communication using dual encryption
Computer Communications
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Hi-index | 0.00 |
Security issues in multicast communication have rarely been touched upon to date. We believe that wide-area multicast communication is at a substantially increased risk from specific security threats, compared with the same threats in unicast. This arises both from the lack of any form of effective group access control, and from the fact that multicast traffic traverses potentially many more communication links than does a single unicast communication, thereby creating more opportunity for a link attack. We discuss specific threats that are relevant to multicast, and explain why they are so. We propose security mechanisms specifically for multicast groups requiring safeguards that afford protection against some of these threats. More precisely, we propose a version of the IGMP protocol that can reliably enforce subnet-level group access control. We also describe a scalable mechanism to control multicast traffic in transit that can, for example, prevent a misbehaving source from causing undue congestion over the wide-area.