Adding confidentiality to application-level multicast by leveraging the multicast overlay

Cristina Abad, Indranil Gupta, William Yurcik

Research output: Contribution to conferencePaperpeer-review

Abstract

While scalability, routing and performance are core issues for Application-Level Multicast (ALM) protocols, an important but less studied problem is security. In particular, confidentiality (i.e. data secrecy, achieved through data encryption) in ALM protocols is needed. Key management schemes must be simple, scalable, and must not degrade the performance of the ALM protocol. We explore three key management schemes that leverage the underlying overlay to distribute the key(s) and secure ALM. We evaluate their impact on three well-known ALM protocols: ESM, ALMI and NICE. Through analysis and simulations, we show that utilizing the ALM overlay to distribute key(s) is feasible. For a given ALM protocol, choice of the best key management scheme depends on the application needs: minimizing rekeying latency or minimizing data multicasting latency.

Original languageEnglish (US)
DOIs
StatePublished - 2005
Event25th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2005 - Columbus, OH, United States
Duration: Jun 6 2005Jun 10 2005

Conference

Conference25th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2005
Country/TerritoryUnited States
CityColumbus, OH
Period6/6/056/10/05

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Adding confidentiality to application-level multicast by leveraging the multicast overlay'. Together they form a unique fingerprint.

Cite this