Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an attempt to fill that research gap, we propose a dual multicast key management scheme for secure group communications in PMIPv6-based Long Term Evolution (LTE) networks. This scheme satisfies the requirements for forward and backward secrecy. Moreover, the performance analysis demonstrates that the proposed scheme incurs low communication and storage costs. Finally, we provide guidelines for Internet service providers (ISPs) to select the suitable multicast key management architecture.
Published in | American Journal of Electrical and Computer Engineering (Volume 1, Issue 2) |
DOI | 10.11648/j.ajece.20170102.11 |
Page(s) | 50-60 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Multicast, Confidentiality, Privacy, Proxy Mobile IPv6, Key Management
[1] | S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, “Proxy Mobile IPv6,” RFC 5213, Aug. 2008. |
[2] | D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775, Jun. 2004. |
[3] | H. Soliman, C. Castelluccia, K. ElMalki, and L. Bellier, “Hierarchical Mobile IPv6 (HMIPv6) Mobility Management,” RFC 5380, Oct. 2008. |
[4] | Ed. R. Koodli, “Mobile IPv6 Fast Handovers,” RFC 5268, Jun. 2008. |
[5] | F. Xia and B. Sarikaya, “FMIPv6 Extension for Multicast Handover,” Draft-xia-mipshop-fmip-multicast-01, IETF draft, Sep. 2007. |
[6] | G. A. Leoleisa, G. N. Prezerakosb, and I. S. Venierisa, “Seamless Multicast Mobility Support Using Fast MIPv6 Extensions,” Computer Communications, vol. 29, pp. 3745-3765, Nov. 2006. |
[7] | D. H. Kwon, W. J. Kim, Y. S. Kim, W. S. Im, Y.J. Suh, “Design and Implementation of an Efficient Multicast Support Scheme for FMIPv6,” IEEE International Conference on Computer Communications (INFOCOM), pp. 1-12, Apr. 2006. |
[8] | T. C. Schmidt and M. Waehlisch, “Seamless Multicast Handover in a Hierarchical Mobile IPv6 Environment (M-HMIPv6),” Draft-schmidt-waehlisch-mhmipv6-04, IETF draft, Nov. 2005. |
[9] | R. Vida and L. Costa, “Multicast Listener Discovery Version 2 (MLDv2) for IPv6,” RFC 3810, Jun. 2004. |
[10] | B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan, “Internet Group Management Protocol, Version 3,” RFC 3376, Oct. 2002. |
[11] | J. Guan, Y. Qin, S. Gao, and H. Zhang, “The Performance Analysis of Multicast in Proxy Mobile IPv6,” IEEE International Conference on Communications Technology and Applications (ICCTA), pp. 719-723, Oct. 2009. |
[12] | M. Hui, G. Chen, and H. Deng, “Fast Handover for Multicast in Proxy Mobile IPv6,” Draft-hui-multimob-fast-handover-00, IETF draft,Jun. 2009. |
[13] | H. Asaeda, P. Seite, and J. Xia, “PMIPv6 Extensions for Multicast,” Draft-asaeda-multimob-pmip6-extension-03, IETF draft, Mar. 2010. |
[14] | J. Guan, H. Zhou, H. Zhang, and H. Luo, “Multicast Extension Support for Proxy MIPv6,” IEEE Consumer Communications and Networking Conference (CCNC), pp. 1-5, Jan. 2010. |
[15] | D.Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architecture,” RFC 2627, Jun. 1999. |
[16] | C. K. Wong, M. Gouda, and S. S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000. |
[17] | Y. Sun, W. Trappe, and K. J. R. Liu, “An Efficient Key Management Scheme for Secure Wireless Multicast,” IEEE International Conference on Communications (ICC), pp. 1236-1240, Aug. 2002. |
[18] | Y. Sun, W. Trappe, and K. J. R. Liu, “A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004. |
[19] | Architecture Enhancements for Non-3GPP Accesses, 3GPP Technical Specifications TS23.402, Mar. 2008. |
[20] | 3rd Generation Partnership Project TS24.312. (Dec. 2008). Access Network Discovery and Selection Function (ANDSF) Management Object (MO), Release 8, v8.0.0. |
[21] | B. B. Wang, Y. L. Wu, F. Han, Y. H. Yang, and K. J. Ray Liu, “Green Wireless Communications: A Time-Reversal Paradigm,” IEEE Journal on Selected Areas in Communications (JSAC), vol. 29, no. 8, pp. 1698-1710, Sept. 2011. |
[22] | Aparna S. Pande and Ravindra. C. Thool, “Survey on Logical Key Hierarchy for Secure Group Communication,” IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), pp. 1131-1136, Sept. 2016. |
[23] | Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd, and Ramli1 and Shayla Islam, “Advance Signaling Cost for Multicast Fast Reroute Proxy Mobility Management,” Indian Journal of Science and Technology, vol. 9, pp. 1-6, Jul. 2016. |
[24] | Manisha Yadav, Karan Singh, and Ajay Shekhar Pandey, “Key Management in Efficient and Secure Group Communication,” IEEE International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES), pp. 196-203, Mar. 2016. |
[25] | Yi Ren, Jyh-Cheng Chen, Jui-Chih Chin, and Yu-Chee Tseng, “Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service,” IEEE Transactions on Wireless Communications, vol. 15, no. 12, pp. 8463-8476, Oct. 2016. |
APA Style
Ming-Chin Chuang. (2017). Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks. American Journal of Electrical and Computer Engineering, 1(2), 50-60. https://doi.org/10.11648/j.ajece.20170102.11
ACS Style
Ming-Chin Chuang. Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks. Am. J. Electr. Comput. Eng. 2017, 1(2), 50-60. doi: 10.11648/j.ajece.20170102.11
@article{10.11648/j.ajece.20170102.11, author = {Ming-Chin Chuang}, title = {Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks}, journal = {American Journal of Electrical and Computer Engineering}, volume = {1}, number = {2}, pages = {50-60}, doi = {10.11648/j.ajece.20170102.11}, url = {https://doi.org/10.11648/j.ajece.20170102.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20170102.11}, abstract = {Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an attempt to fill that research gap, we propose a dual multicast key management scheme for secure group communications in PMIPv6-based Long Term Evolution (LTE) networks. This scheme satisfies the requirements for forward and backward secrecy. Moreover, the performance analysis demonstrates that the proposed scheme incurs low communication and storage costs. Finally, we provide guidelines for Internet service providers (ISPs) to select the suitable multicast key management architecture.}, year = {2017} }
TY - JOUR T1 - Novel Multicast Key Management Scheme for PMIPv6-Based LTE Networks AU - Ming-Chin Chuang Y1 - 2017/06/02 PY - 2017 N1 - https://doi.org/10.11648/j.ajece.20170102.11 DO - 10.11648/j.ajece.20170102.11 T2 - American Journal of Electrical and Computer Engineering JF - American Journal of Electrical and Computer Engineering JO - American Journal of Electrical and Computer Engineering SP - 50 EP - 60 PB - Science Publishing Group SN - 2640-0502 UR - https://doi.org/10.11648/j.ajece.20170102.11 AB - Multicast services grow up quickly and thus they urgently call for a secure mechanism to provide the confidentiality and privacy of communications. Recently, multicast issues in Proxy Mobile IPv6 (PMIPv6) networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. In an attempt to fill that research gap, we propose a dual multicast key management scheme for secure group communications in PMIPv6-based Long Term Evolution (LTE) networks. This scheme satisfies the requirements for forward and backward secrecy. Moreover, the performance analysis demonstrates that the proposed scheme incurs low communication and storage costs. Finally, we provide guidelines for Internet service providers (ISPs) to select the suitable multicast key management architecture. VL - 1 IS - 2 ER -