Why Hierarchical Key Distribution Is Appropriate for Multicast Networks

نویسندگان

  • Chandana Gamage
  • Jussipekka Leiwo
  • Yuliang Zheng
چکیده

The design rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e ciency exi bility and scalability In most instances the choice of key server placement in a multicast network architecture is based on intuitive cryptographic considerations We use an analytical model of multicast group formation and network growth to look at the selection of a key distribution scheme from a network operation perspective Thereafter this model is used to validate the choice of hierarchical hybrid key distribution model as the most appropriate

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Source Authentication for Multicasting in MANETs

1 Abstract— In this paper, we investigate a popular source authentication scheme, TESLA (Timed Efficient Stream Loss-tolerant Authentication) for multicast communication in mobile ad hoc networks. We evaluate the performance of a source authentication scheme inspired from TESLA and TESLA based on simulations. Time synchronization is a crucial assumption made by these schemes. We describe effect...

متن کامل

Key Distribution Mechanisms for Wireless Sensor Networks: a Survey

Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure-less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Multicast Routing in Hierarchical Optical Networks Using Collection-Distribution Networks - (An Invited Paper)

Emerging optical networks have hierarchical architectures with varying capabilities at different levels. Moreover, many applications nowadays require multicast (one-to-many) connections. We propose a network model that has such a hierarchical architecture which is designed for multicast connections. We develop a multi-stage routing scheme which solves the routing problem in different levels of ...

متن کامل

An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks

An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. This flexibility in space and time induces new challenges towards the security infrastructure needed to support secure unicast and multicast communications. Especially, traditional group key management architectures meant for wir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999