Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network
Abstract
:1. Introduction
- IP multicast lacks of an effective multicast source and receiver access control mechanism, and it has no limitations on multicast source and multicast receiver, which makes the deployment of Authentication Authorization Accounting (AAA) service more difficult.
- The membership management in IP multicast is coarse-grained, which takes the router as the basic unit and cannot manage the concrete multicast members.
- The join and leave operation may result in frequently multicast forward tree reconstruction, which have a great impact on the stabilization of multicast services.
- The multicast data lacks of the security mechanism which may result in data leakage.
- IP multicast routing protocol does not record the topology (In resource-constraint environments, maintaining topologies is costly and may not be feasible), and computes the multicast delivery tree in a distributed way, which is difficult to support QoS multicast.
- We propose a central-controllable and secure multicast based on UIN to provide the centralized multicast membership management and centralized multicast routing mechanism.
- We design the operation flow of CCSM which includes multicast membership registration, join/leave, multicast tree construction and update, which is a new design different from the current IGMP/MLD and multicast routing protocols.
- We analyse the mobility, security of CCSM, and evaluate its performance in terms of multicast delivery reconstruction cost and multicast join delay.
- CCSM adopts the Publish/Subscribe model to provide multicast service which is suitable for IoT applications that deliver the messages among sensors.
2. Related Work
2.1. Multicast Architectures
2.1.1. SDN-Based Multicast
2.1.2. HIP-Based Multicast
2.1.3. LISP-Based Multicast
2.1.4. ILNP-Based Multicast
2.1.5. IoT-Based Multicast
2.2. Multicast Security Support
2.3. Multicast Mobility Support
3. System Design
3.1. CCSM Basic Components
3.2. CCSM General Operation Flow
- Multicast service discovery: MMC notifies its multicast service scope, and ASR stores this relation between MMC and its serving MSI scope. In this way, every multicast member will acquire the MMC information for a given MSI.
- Multicast member registration: Multicast member sends source/receiver registration message to MMC to subscribe MSIs. MMC will create the subscription relation between members’ AIDs and their subscribed MSIs. At the same time, MMC will assign authentication codes for members.
- Multicast member join: Multicast member (source and receiver) sends join message to ASR and ASR forwards this join message to update the multicast membership in MMC to update the multicast delivery tree and related multicast routing in ASR/CR.
- Multicast data transmission: Once the multicast routing complete the update, the multicast receiver will get the multicast data, and the multicast source will send the multicast data.
- Update and maintenance: During the multicast service procedure, the multicast membership will be dynamic and therefore the multicast routing has to update in time to avoid the packet loss. The multicast routing update procedure is maintained by MMC based on the up-to-date multicast membership. The multicast routing state update periodically, and at the same time the changes of subscription membership will also trigger the multicast routing update.
- Multicast member leave: Once a multicast member wants to leave certain multicast group, it will send a leave message to MMC, and MMC will perform the multicast routing update procedure to prune the multicast delivery tree. As for a multicast source leave the group, the multicast delivery tree will be suppressed if there are no other sources in that group.
- Multicast member de-registration: Once a multicast member wants to un-subscribe a multicast service, it will send a de-registration message to MMC, and MMC will update the related multicast membership and multicast routing. In this case, the de-registration indicates that the multicast member leaves the group forever.
- Proxy mechanism: This proxy mechanism is similar to IGMP/MLD proxying [66] which can set the proxy node by configuring the upstream interface and downstream interfaces, and maintains a static forwarding structure for multicast members. Notice that, generally there is not routing in access network of UIN for that the AID is used for identifying the host.
3.3. Multicast Member Registration Procedure
3.4. Multicast Member Join/Leave Procedure
3.5. Multicast Tree Generation Procedure
3.5.1. Topology Gather
3.5.2. Root Election
- Root bootstrapping mechanism
- (1)
- Compare the priorities of candidate roots, and select the root with highest priority;
- (2)
- If the priority is equal, then compare the hash value according to Equation (1), and select the root with highest hash value;
- (3)
- In the other case, select the candidate root with large RID.
- Root update mechanism
3.5.3. Path Calculation
- Case 1: No multicast source, multiple multicast receivers;
- Case 2: One multicast source, multiple multicast receivers;
- Case 3: Multiple multicast sources, multiple multicast receivers;
- Case 4: One or more multicast sources, no multicast receiver.
- (1)
- New multicast member join procedure
- (2)
- Multicast member leave procedure
3.5.4. Multicast Routing Information Distribution
3.6. Discuss
- CCSM is based on the UIN architecture and inherits the characteristics of UIN in terms of mobility, security and reliability, which means that CCSM can support endogenetic security and mobile multicast.
- CCSM separates the multicast routing computation and multicast data forwarding, which simplifies the multicast routing function on router. Therefore, CCSM is suitable for the scenarios where computing and storage resources are constrained such as IoT applications.
- CCSM provides the multicast member registration mechanism which supports the multicast source and receiver access control, and provides a publish/subscribe model for multicast services.
- CCSM provides the multicast join/leave mechanism which is different from the traditional IGMP/MLD, and it supports the controllable multicast membership management.
- CCSM adopts the centralized multicast routing computation which can easily support various multicast policies including security and QoS, and supports controllable multicast routing, and speeds up the multicast routing convergence.
- CCSM has lots of potential applications due to the existing UIN applications in vehicular communication [13,14,15], satellite-terrestrial networks [16], wireless sensor networks [17] and smart grid [18]. To provide a larger scale deployment of CCSM, some function entities can be implemented in an overlay mode. To be more specific, ASR can be deployed in form of a home router close to the multicast members. The CR can inherit the existing routers. IDMS, AC and MMC can be deployed in the cloud platform.
4. Performance Evaluation
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Leiner, B.M.; Cerf, V.G.; Clark, D.D.; Kahn, R.E.; Kleinrock, L.; Lynch, D.C.; Postel, J.; Roberts, L.G.; Wolff, S. A brief history of the Internet. ACM SIGCOMM Comput. Commun. Rev. 2009, 39, 22–31. [Google Scholar] [CrossRef]
- Miniwatts Marketing Group. Internet World Stats Usage and Population Statistics. 2018. Available online: https://www.internetworldstats.com/stats.htm (accessed on 30 June 2018).
- Cisco. Cisco Visual Networking Index: Forecast and Methodology, 2016–2021. 2017. Available online: https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html (accessed on 30 June 2018).
- Pan, J.; Paul, S.; Jain, R. A Survey of the research on future Internet architectures. IEEE Commun. Mag. 2012, 49, 26–36. [Google Scholar] [CrossRef]
- Zhang, H.; Quan, W.; Chao, H.C.; Qiao, C. Smart identifier network: A collaborative architecture for the future Internet. IEEE Netw. 2016, 30, 46–51. [Google Scholar] [CrossRef]
- Jacobfeuerborn, B.; Meissner, P. 5G White Paper. 2015. Available online: https://www.ngmn.org/fileadmin/ngmn/content/downloads/Technical/2015/NGMN_5G_White_Paper_V1_0.pdf (accessed on 30 June 2018).
- Xylomenos, G.; Ververidis, C.N.; Siris, V.A.; Fotiou, N.; Tsilopoulos, C.; Vasilakos, X.; Katsaros, K.V.; Polyzos, G.C. A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 2014, 16, 1024–1049. [Google Scholar] [CrossRef]
- Dong, P.; Qin, Y.; Zhang, H. Research on universal network supporting pervasive services. Acta Electron. Sin. 2007, 35, 599–606. [Google Scholar]
- Zhang, H.k.; Luo, H.B. Fundamental research on theories of smart and cooperative networks. Acta Electron. Sin. 2013, 41, 1249–1254. [Google Scholar]
- Song, F.; Zhou, Y.; Kong, K.; Zheng, Q.; You, I.; Zhang, H. Smart collaborative connection management for identifier-based network. IEEE Access 2017, 5, 7936–7949. [Google Scholar] [CrossRef]
- Zhang, H.; Su, W.; Quan, W. Smart Collaborative Identifier Network—A Promising Design for Future Internet; Springer: Berlin, Germany, 2016. [Google Scholar]
- Guan, J.; Yan, Z.; Yao, S.; Xu, C.; Zhang, H. GBC-based caching function group selection algorithm for SINET. J. Netw. Comput. Appl. 2017, 85, 56–63. [Google Scholar] [CrossRef]
- Dong, P.; Zheng, T.; Yu, S.; Zhang, H.; Yan, X. Enhancing vehicular communication using 5G-enabled smart collaborative networking. IEEE Wirel. Commun. 2017, 24, 72–79. [Google Scholar] [CrossRef]
- Quan, W.; Liu, Y.; Zhang, H.; Yu, S. Enhancing crowd collaborations for software defined vehicular networks. IEEE Commun. Mag. 2017, 55, 80–86. [Google Scholar] [CrossRef]
- Dong, P.; Song, B.; Zhang, H.; Du, X. Improving onboard Internet services for high-speed vehicles by multipath transmission in heterogeneous wireless networks. IEEE Trans. Veh. Technol. 2016, 65, 9493–9507. [Google Scholar] [CrossRef]
- Feng, B.; Zhou, H.; Zhang, H.; Li, G.; Li, H.; Yu, S.; Chao, H. HetNet: A flexible architecture for heterogeneous satellite-terrestrial networks. IEEE Netw. 2017, 31, 86–92. [Google Scholar] [CrossRef]
- Yang, D.; Xu, Y.; Wang, H.; Zheng, T.; Zhang, H.; Zhang, H.; Gidlund, M. Assignment of segmented slots enabling reliable real-time transmission in industrial wireless sensor networks. IEEE Trans. Ind. Electron. 2015, 62, 3966–3977. [Google Scholar] [CrossRef]
- Jiang, Z.; Quan, W.; Guan, J.; Zhang, H. A SINET-based communication architecture for smart grid. In Proceedings of the International Telecommunication Networks and Applications Conference, (ITNAC 2015), Sydney, Australia, 18–20 November 2015; pp. 298–301. [Google Scholar]
- Guan, J.; Quan, W.; Xu, C.; Zhou, H.; Zhang, H. The multicast service model for next generation Internet based on identifier/locator separation. In Proceedings of the 2012 IEEE Globecom Workshops (GLOBECOM 2012), Anaheim, CA, USA, 3–7 December 2012; pp. 992–997. [Google Scholar]
- Rahman, A.; Dijk, E. Group Communication for the Constrained Application Protocol (CoAP); RFC 7390; IETF: Fremont, CA, USA, 2014; pp. 1–46. [Google Scholar]
- Fenner, B.; Handley, M.; Holbrook, H.; Kouvelas, I.; Parekh, R.; Zhang, Z.; Zheng, L. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification (Revised); RFC 7761; IETF: Fremont, CA, USA, 2015; pp. 1–137. [Google Scholar]
- Adams, A.; Nicolas, J.; Siadak, W. Protocol Independent Multicast-Dense Mode (PIM-DM): Protocol Specification (Revised); RFC 3973; IETF: Fremont, CA, USA, 2006; pp. 1–59. [Google Scholar]
- Handley, M.; Kouvelas, I.; Speakman, T.; Vicisano, L. Bidirectional Protocol Independent Multicast (BIDIR-PIM); RFC 5015; IETF: Fremont, CA, USA, 2007; pp. 1–43. [Google Scholar]
- Deering, S. Host Extensions for IP Multicasting. 1989. Available online: https://tools.ietf.org/html/rfc1112 (accessed on 30 June 2018).
- Cheriton, D.R.; Deering, S.E. Host Groups: A Multicast Extension for Datagram Internetworks. SIGCOMM Comput. Commun. Rev. 1985, 15, 172–179. [Google Scholar] [CrossRef]
- Cain, B.; Deering, S.; Fenner, B.; Kouvelas, I.; Thyagarajan, A. Internet Group Management Protocol, Version 3. 2002. Available online: https://tools.ietf.org/html/rfc3376 (accessed on 30 June 2018).[Green Version]
- Vida, R.; Costa, L.H.M.K.; Fdida, S.; Deering, S.; Fenner, B.; Kouvelas, I.; Haberman, B. Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004. Available online: https://tools.ietf.org/html/rfc3810 (accessed on 30 June 2018).[Green Version]
- Judge, P.; Ammar, M. Security issues and solutions in multicast content distribution: A survey. IEEE Netw. 2003, 17, 30–36. [Google Scholar] [CrossRef]
- Guan, J. Research on key technologies of IPv6 mobile multicast. Beijing Jiaotong Univ. 2009, 16–18. [Google Scholar] [CrossRef]
- Guan, J.; You, I.; Xu, C.; Zhang, H. The PMIPv6-Based Group Binding Update for IoT Devices. Mob. Inf. Syst. 2016, 2016, 7853219. [Google Scholar] [CrossRef]
- Islam, S.; Muslim, N.; Atwood, J.W. A Survey on Multicasting in Software-Defined Networking. IEEE Commun. Surv. Tutor. 2018, 20, 355–387. [Google Scholar] [CrossRef]
- Shen, S.H.; Huang, L.H.; Yang, D.N.; Chen, W.T. Reliable multicast routing for software-defined networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, 26 April–1 May 2015; pp. 181–189. [Google Scholar]
- Blendin, J.; Rückert, J.; Volk, T.; Hausheer, D. Adaptive software defined multicast. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK, 13–17 April 2015; pp. 1–9. [Google Scholar]
- Ruckert, J.; Blendin, J.; Hark, R.; Hausheer, D. DYNSDM: Dynamic and flexible software-defined multicast for ISP environments. In Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, 9–13 November 2015; pp. 117–125. [Google Scholar]
- Humernbrum, T.; Hagedorn, B.; Gorlatch, S. Towards efficient multicast communication in Software-Defined Networks. In Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Nara, Japan, 27–30 June 2016; pp. 106–113. [Google Scholar]
- Moskowitz, R.; Komu, M. Host Identity Protocol Architecture. 2018. Available online: https://tools.ietf.org/html/draft-ietf-hip-rfc4423-bis-19 (accessed on 30 June 2018).
- Moskowitz, R.; Heer, T.; Jokela, P.; Henderson, T.R. Host Identity Protocol Version 2 (HIPv2). 2015. Available online: https://tools.ietf.org/html/rfc7401 (accessed on 30 June 2018).[Green Version]
- Henderson, T.; Gurtov, A. The Host Identity Protocol (HIP) Experiment Report. 2012. Available online: https://tools.ietf.org/html/rfc6538 (accessed on 30 June 2018).[Green Version]
- Kovacshazi, Z.; Vida, R. Host Identity Specific Multicast. In Proceedings of the 2007 Third International Conference Networking and Services (ICNS), Athens, Greece, 19–25 June 2007. [Google Scholar]
- Zhu, X.; Atwood, J.W. A Secure Multicast Model for Peer-to-Peer and Access Networks Using the Host Identity Protocol. In Proceedings of the 2007 4th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 11–13 January 2007; pp. 1098–1102. [Google Scholar]
- Zhu, X.; Ding, Z.; Wang, X. A Multicast Routing Algorithm Applied to HIP-Multicast Model. In Proceedings of the 2011 International Conference on Network Computing and Information Security, Guilin, China, 14–15 May 2011; Volume 1, pp. 169–174. [Google Scholar]
- Särelä, M.; Esteve Rothenberg, C.; Zahemszky, A.; Nikander, P.; Ott, J. BloomCasting: Security in Bloom Filter Based Multicast. In Information Security Technology for Applications; Aura, T., Järvinen, K., Nyberg, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 1–16. [Google Scholar]
- Farinacci, D.; Fuller, V.; Meyer, D.; Lewis, D. The Locator/ID Separation Protocol (LISP). 2013. Available online: https://tools.ietf.org/html/rfc6830 (accessed on 30 June 2018).
- Farinacci, D.; Meyer, D.; Zwiebel, J.; Venaas, S. The Locator/ID Separation Protocol (LISP) for Multicast Environments. 2013. Available online: https://tools.ietf.org/html/rfc6831 (accessed on 30 June 2018).[Green Version]
- Moreno, V.; Farinacci, D. Signal-Free LISP Multicast. 2018. Available online: https://tools.ietf.org/html/draft-ietf-lisp-signal-free-multicast-09 (accessed on 30 June 2018).
- Atkinson, R.; Bhatti, S. Identifier-Locator Network Protocol (ILNP) Architectural Description. 2012. Available online: https://tools.ietf.org/html/rfc6740 (accessed on 30 June 2018).[Green Version]
- Antonini, M.; Cirani, S.; Ferrari, G.; Medagliani, P.; Picone, M.; Veltri, L. Lightweight multicast forwarding for service discovery in low-power IoT networks. In Proceedings of the 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 17–19 September 2014; pp. 133–138. [Google Scholar]
- Santamaria, A.F.; Sottile, C.; Fazio, P. PAMTree: Partitioned Multicast Tree Protocol for Efficient Data Dissemination in a VANET Environment. Int. J. Distrib. Sens. Netw. 2015, 11, 431492. [Google Scholar] [CrossRef]
- Winter, T.; Thubert, P.; Brandt, A.; Hui, J.W.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.; Alexander, R.K. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. 2012. Available online: https://tools.ietf.org/html/rfc6550 (accessed on 30 June 2018).
- Hui, J.W.; Kelsey, R. Multicast Protocol for Low-Power and Lossy Networks (MPL). 2016. Available online: https://tools.ietf.org/html/rfc7731 (accessed on 30 June 2018).[Green Version]
- Levis, P.; Clausen, T.H.; Hui, J.; Gnawali, O.; Ko, J. The Trickle Algorithm. 2011. Available online: https://tools.ietf.org/html/rfc6206 (accessed on 30 June 2018).
- Oikonomou, G.; Phillips, I.; Tryfonas, T. IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks. Wirel. Pers. Commun. 2013, 73, 1089–1116. [Google Scholar] [CrossRef] [Green Version]
- Abdel Fadeel, K.Q.; El Sayed, K. ESMRF: Enhanced Stateless Multicast RPL Forwarding For IPv6-based Low-Power and Lossy Networks. In Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems (IoT-Sys ’15), Florence, Italy, 18 May 2015; ACM: New York, NY, USA, 2015; pp. 19–24. [Google Scholar]
- Lorente, G.G.; Lemmens, B.; Carlier, M.; Braeken, A.; Steenhaut, K. BMRF: Bidirectional Multicast RPL Forwarding. Ad Hoc Netw. 2017, 54, 69–84. [Google Scholar] [CrossRef]
- Conti, M.; Kaliyar, P.; Lal, C. REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES ’17), Reggio Calabria, Italy, 29 August–1 September 2017; ACM: New York, NY, USA, 2017; pp. 84:1–84:8. [Google Scholar]
- Rahman, A.; Dijk, E. Group Communication for the Constrained Application Protocol (CoAP). 2014. Available online: https://tools.ietf.org/html/rfc7390 (accessed on 30 June 2018).[Green Version]
- Hardjono, T.; Weis, B. The Multicast Group Security Architecture; RFC 3740; IETF: Fremont, CA, USA, 2004; pp. 1–26. [Google Scholar]
- Baugher, M.; Canetti, R.; Dondeti, L.R.; Lindholm, F. Multicast Security (MSEC) Group Key Management Architecture; RFC 4046; IETF: Fremont, CA, USA, 2005; pp. 1–38. [Google Scholar]
- Challal, Y.; Bettahar, H.; Bouabdallah, A. A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Commun. Surv. Tutor. 2004, 6, 34–57. [Google Scholar] [CrossRef] [Green Version]
- Kellil, M.; Romdhani, I.; Lach, H.; Bouabdallah, A.; Betttahar, H. Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. IEEE Commun. Surv. Tutor. 2005, 7, 46–70. [Google Scholar] [CrossRef]
- Rams, T.; Pacyna, P. A Survey of Group Key Distribution Schemes With Self-Healing Property. IEEE Commun. Surv. Tutor. 2013, 15, 820–842. [Google Scholar] [CrossRef]
- Porambage, P.; Braeken, A.; Schmitt, C.; Gurtov, A.; Ylianttila, M.; Stiller, B. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications. IEEE Access 2015, 3, 1503–1511. [Google Scholar] [CrossRef]
- Castiglione, A.; D’Arco, P.; Santis, A.D.; Russo, R. Secure group communication schemes for dynamic heterogeneous distributed computing. Futur. Gener. Comput. Syst. 2017, 74, 313–324. [Google Scholar] [CrossRef]
- Wang, L.; Qin, Y.; Zhou, H.; Guan, J.; Zhang, H. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes. Mob. Inf. Syst. 2015, 2015, 741460. [Google Scholar] [CrossRef]
- Guan, J.; Zhou, H.; Xu, C.; Zhang, H.; Luo, H. The Performance Analysis of the Multicast Extension Support for Proxy MIPv6. Wirel. Pers. Commun. 2011, 61, 657–677. [Google Scholar] [CrossRef]
- Fenner, B.; He, H.; Haberman, B.; Sandick, H. Internet Group Management Protocol (IGMP)/Multicast Listener Discovery (MLD)-Based Multicast Forwarding (“IGMP/MLD Proxying”). 2006. Available online: https://tools.ietf.org/html/rfc4605 (accessed on 30 June 2018).
- Skiena, S. Dijkstra’s algorithm. In Implementing Discrete Mathematics: Combinatorics and Graph Theory with Mathematica, Reading; Addison-Wesley: Boston, MA, USA, 1990; pp. 225–227. [Google Scholar]
- Winick, J.; Jamin, S. Inet Topology Generator. 2002. Available online: http://topology.eecs.umich.edu/inet/ (accessed on 30 June 2018).
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Guan, J.; Liu, X.; Yao, S.; Jiang, Z. Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network. Sensors 2018, 18, 2135. https://doi.org/10.3390/s18072135
Guan J, Liu X, Yao S, Jiang Z. Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network. Sensors. 2018; 18(7):2135. https://doi.org/10.3390/s18072135
Chicago/Turabian StyleGuan, Jianfeng, Xuan Liu, Su Yao, and Zhongbai Jiang. 2018. "Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network" Sensors 18, no. 7: 2135. https://doi.org/10.3390/s18072135
APA StyleGuan, J., Liu, X., Yao, S., & Jiang, Z. (2018). Design and Implementation of a Central-Controllable and Secure Multicast System Based on Universal Identifier Network. Sensors, 18(7), 2135. https://doi.org/10.3390/s18072135