Secure group communication protocol for distributed systems

نویسندگان

  • Makoto Takizawa
  • Hiroya Mita
چکیده

Group communication among multiple entities is required in distributed applications like groupware systems. In addition to conventional wide-area networks, local area networks (LANs) and radio networks are available to realize the applications. The LANs and radio networks provide broadcast communication at the media access control (MAC) layer, that is, every communication entity, i.e. station can receive every protocol data unit (PDU) transmitted in the network. The group communication can be easily realized by these networks. One problem in the broadcast network is how to provide the secure communication for the group. In this paper, we discuss how to provide secure broadcast communication among multiple entities in the presence of attacks by malicious entities. The protocol is based on the distributed control scheme by using reliable but unsecure broadcast networks. In the protocol, each entity in a group of entities named as a cluster decides the same secret key by exchanging the nonce, e.g. random number encryphered by the public key.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

The Cost of Adding Security Services to Group Communication Systems

Numerous applications requiring information delivery from one sender to many receivers are based on a group communication model. Group communication systems are used in industry and military systems where reliability and high-availability are required. With the growth of the Internet, the number of applications that can take advantage of a group communication infrastructure increased (teleconfe...

متن کامل

Scalable Group Key Exchange for Securing Distributed Operating Systems

Distributed operating systems are designed to run over a collection of computing nodes that are spatially disseminated and communicate through a computer network. The computing nodes interact collaboratively with each other in order to pursue a common purpose. Protecting group communication between the collaborating nodes against potential attacks is one of the major challenges faced by the des...

متن کامل

An Integrated Solution for Secure Group Communication in Wide-Area Networks

Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993