Secure group communication protocol for distributed systems
نویسندگان
چکیده
Group communication among multiple entities is required in distributed applications like groupware systems. In addition to conventional wide-area networks, local area networks (LANs) and radio networks are available to realize the applications. The LANs and radio networks provide broadcast communication at the media access control (MAC) layer, that is, every communication entity, i.e. station can receive every protocol data unit (PDU) transmitted in the network. The group communication can be easily realized by these networks. One problem in the broadcast network is how to provide the secure communication for the group. In this paper, we discuss how to provide secure broadcast communication among multiple entities in the presence of attacks by malicious entities. The protocol is based on the distributed control scheme by using reliable but unsecure broadcast networks. In the protocol, each entity in a group of entities named as a cluster decides the same secret key by exchanging the nonce, e.g. random number encryphered by the public key.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملThe Cost of Adding Security Services to Group Communication Systems
Numerous applications requiring information delivery from one sender to many receivers are based on a group communication model. Group communication systems are used in industry and military systems where reliability and high-availability are required. With the growth of the Internet, the number of applications that can take advantage of a group communication infrastructure increased (teleconfe...
متن کاملScalable Group Key Exchange for Securing Distributed Operating Systems
Distributed operating systems are designed to run over a collection of computing nodes that are spatially disseminated and communicate through a computer network. The computing nodes interact collaboratively with each other in order to pursue a common purpose. Protecting group communication between the collaborating nodes against potential attacks is one of the major challenges faced by the des...
متن کاملAn Integrated Solution for Secure Group Communication in Wide-Area Networks
Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993