Multiple Operations for Secure Multicast Communication
نویسندگان
چکیده
منابع مشابه
Multiple Operations for Secure Multicast Communication
Group key management is a critical task to make the secure multicast application. Group manager is responsible for changing and re-distributing (rekeying) the group key whenever it deems necessary. Many applications will require a security infrastructure that ensures multiple levels of access control for group members and also require very fast rekeying so that it is not disruptive to their per...
متن کاملSecure Communication in Multicast Graphs
In this paper we solve the problem of secure communication in multicast graphs, which has been open for over a decade. At Eurocrypt ’98, Franklin and Wright initiated the study of secure communication against a Byzantine adversary on multicast channels in a neighbor network setting. Their model requires node-disjoint and neighbor-disjoint paths between a sender and a receiver. This requirement ...
متن کاملSecure Multicast Communication Using Group Based Multicast Hierarchy
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providing complete security in such networks. This paper proposes a efficient Group Based Multicast Hierarchy (GBMH) algorithm for secret multicast communication, in which source nodes used ...
متن کاملSecure Reverse Communication in a Multicast Tree
Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast applications require the receivers to securely send some real-time information back to the source, which leads to a many-to-one communication scenario. Using unicast connections to send this reverse traffic results in a data imp...
متن کاملScalable Secure Group Communication over IP Multicast
We introduce and analyze a scalable re-keying scheme for implementing secure group communications over IP multicast. We show that our scheme incurs constant processing, message, and storage overhead for a re-key operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/14998-3077