Abstract

Internet Protocol (IP) multicasting is a method for one-to-many and many-to-many communication between hosts in an IP network. This communication happens in a real-time synchronous fashion. It is a useful mechanism for distributing management data in a Local Area Network (LAN). Management data includes frequent updating of host Operating System (OS), security patches, OS update for network hardware, new configuration updates, etc. In the absence of any admission control or a source identification, any host with malicious intent can disseminate malicious codes or rootkits exploiting the underlying multicast framework. Routing protocols like RIPv2 and OSPF use a certain form of authentication to exchange routing information with their peer routers. However, their authentication and the distribution of routing information in its present form has several security and performance-related issues. Motivated through these problems, in this paper, we propose an efficient and scalable multicast architecture for distributing management and routing information in a LAN. We use Core-based Tree (CBT) for constructing the multicast delivery tree and the pseudo identity-based encryption of the underlying cryptosystem. We also demonstrate that our proposed multicast architecture is immune to a number of popular attacks.

Highlights

  • In a corporate network, delivering Operating System (OS) updates and security patches to all legitimate hosts in the network is a demanding task

  • We proposed the use of pseudo-identity based encryption along with core-based tree architecture to create a secure multicast delivery mechanism in a corporate Local Area Network (LAN)

  • The secure multicast established through our proposed system can be used to deploy OS updates, patches, and device updates, including the update of new configuration

Read more

Summary

Introduction

In a corporate network, delivering Operating System (OS) updates and security patches to all legitimate hosts in the network is a demanding task. There are several security pitfalls in the implementation and the use of multicast schemes in a corporate network The rogue router does so to launch a Denial-of-Service (DoS) attack or to sniff the network for any valuable information To address this problem, routing protocols use some form of authentication and multicast mechanism to disseminate routing updates. Our proposed algorithm can be efficiently used to distribute OS and patches to both hosts and network devices, and can be effectively used by routing protocols to distribute their routing information across the network.

The Motivation
Multicast Delivery Mechanism and Its Weaknesses
Router Authentication
Brief Overview of the PrECast Protocol
Pseudo-Identity Based Encryption Framework
Distributed CA
Key Replacement and Key Revocation
Core Based Multicast Tree
Tree Maintenance
Impersonation Attack
Compromised Key
Replay Attack
Single Point Failure
Findings
Conclusions and Future Directions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call