Multicast Security and Its Extension to a

نویسندگان

  • Li Gong
  • Nachum Shacham
چکیده

Multicast is rapidly becoming an important mode of communication and a good platform for building group-oriented services. To be used for trusted communication , however, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to data exchanged by the participants. In this paper, we consider fundamental security issues in building a trusted multicast facility. We discuss techniques for group-based data encryption, authentication of participants, and preventing unauthorized transmissions and receptions. We also describe the application of these principles and techniques in designing an architecture for secure multicast in a mobile environment. A multitude of presently emerging technologies will enable real-time information exchange among multiple participants. Low-cost, high-performance desktop video and audio processing equipment, such as cameras, coders, frame grabbers, and mixers, will make it economical to add real-time generation and display to general-purpose personal workstations. High-speed transmission and switching, now being deployed across the country, will enable instant dissemination of broad-band streams over a wide area. Powerful and exible multicast protocols, for dissemination of information to many recipients, will provide the glue that ties the broadband information generation and processing elements with the underlying broadband networks. A new generation of distributed applications will take advantage of these technologies and provide a quantum leap in network-based services. Multimedia tele-conferencing, computer-supported collaborative work, remote consultation and

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring the Roles of Agricultural Extension in Promoting Food Security in Kwazulu-Natal Province, South Africa

Household food security remains a challenge in South Africa. The national government instituted the Integrated Food Security Strategy (IFSS) programme which identifies household agricultural production as an important element of improving household-level food security. Agricultural extension is well positioned to help achieve this aim, but its current contribution is unknown. This study identif...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Multicast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach

Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...

متن کامل

Secure Multicast with Source Authentication for the Internet of Things

English) The Internet of Things is a rapidly evolving eld of high-end technology and research. Its security is vital to the reliability and safety of the future everyday communications. The DTLS protocol is a default protocol to assure security for unicast communication. A DTLS record layer extension for multicast in constrained environments is being designed to assure security for multicast. H...

متن کامل

Scalable Multicast Security with Dynamic Recipient

In this paper we propose a new framework for multicast security based on distributed computation of security transforms by intermediate nodes. The involvement of intermediate nodes in the security process causes a new type of dependency between group membership and the topology of the multicast network. Thanks to this dependency, the containment of security exposures in large multicast groups i...

متن کامل

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks

In this paper, we present a mechanism for securing group communications in Wireless Sensor Networks (WSN). First, we derive an extension of Logical Key Hierarchy (LKH). Then we merge the extension with directed diffusion. The resulting protocol, LKHW, combines the advantages of both LKH and directed diffusion: robustness in routing, and security from the tried and tested concepts of secure mult...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995