IP multicasting is the ability to send IP datagrams to a set of nodes, or a group, in such a way as to minimize the number of packets. A large body of work exists about IP multicast, both as established standards and ongoing research. Applications such as video/audio distribution are the natural users of this type of networking primitive. However, for multicast communication to be a viable solution for such applications, security services should also be available. In this chapter, we review the core concepts of IP multicast, with particular attention to addressing, routing, and group management. We illustrate the security requirements a secure multicast protocol should satisfy, including data confidentiality and secure group management. We then present an overview of key management protocols, as they are central to any security service.

IP multicast and its security / E. Rosti - In: Handbook of Information Security / Hossein Bidgoli. - Hoboken, NJ : J. Wiley, Inc., 2006 Feb 01. - ISBN 0471648337. - pp. 47 (vol. 1)

IP multicast and its security

E. Rosti
2006

Abstract

IP multicasting is the ability to send IP datagrams to a set of nodes, or a group, in such a way as to minimize the number of packets. A large body of work exists about IP multicast, both as established standards and ongoing research. Applications such as video/audio distribution are the natural users of this type of networking primitive. However, for multicast communication to be a viable solution for such applications, security services should also be available. In this chapter, we review the core concepts of IP multicast, with particular attention to addressing, routing, and group management. We illustrate the security requirements a secure multicast protocol should satisfy, including data confidentiality and secure group management. We then present an overview of key management protocols, as they are central to any security service.
Access control, group management, IP multicast, key management, multicast addressing, multicast routing, party authentication, scalability, security, traffic secrecy
Settore INF/01 - Informatica
1-feb-2006
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/6489
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact