Securing hierarchical multicast communications using roles

Ezedin E. Barka, Emad Eldin Mohamed

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In multicast communications, where service providers distribute services such as streaming multimedia, distributed databases, and etc., an important issue is to control the access to both the transmitted data and the network resources. This issue becomes more complicated when the multicast communication takes place in a hierarchical organizational structure, such as the military. In this paper, we analyze the multicast security issues and propose a new approach to securing hierarchical multicast communications. Specifically, we specify requirements for developing access control policies in hierarchical multicast communications and propose a model for enforcing such policies. Our approach is based on the well-known role-based access control model. We show that our approach is simple, but yet is very flexible, scalable, and effective in controlling the access to the transmitted data as well as to the shared secret key, used in providing data confidentiality.

Original languageEnglish
Title of host publicationProceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Pages101-105
Number of pages5
DOIs
Publication statusPublished - 2009
Event2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009 - Leipzig, Germany
Duration: Jun 21 2009Jun 24 2009

Publication series

NameProceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009

Other

Other2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Country/TerritoryGermany
CityLeipzig
Period6/21/096/24/09

Keywords

  • Access control
  • Multicast communications
  • Multicast security
  • RBAC

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Securing hierarchical multicast communications using roles'. Together they form a unique fingerprint.

Cite this