Secrecy Rate Optimization for Secure Multicast Communications
نویسندگان
چکیده
منابع مشابه
Secrecy & Rate Adaptation for secure HARQ protocols
This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdropper. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions. This problem has been investigated in the literature using a coding scheme that involves a unique secrecy ...
متن کاملSecure communications with an asymptotic secrecy model
As knowledge based systems become more sophisticated, communications between systems or among their subsystems often conducted over public channels such as the Internet, wireless medium, etc. To secure communications over public channels, the most often used method is Diffie and Hellman’s public key infrastructure approach. This method requires a trusted third party to verify identifies, which ...
متن کاملOptimization-Based Congestion Control for Multicast Communications
Widespread deployment of multicast depends critically on the existance of congestion control protocols that are provably fair to unicast traffic. In this work, we present an optimization-based congestion control mechanism for one-to-many communication with provable fairness properties. The optimization-based approach attempts to find an allocation of rates that maximizes the aggregate utility o...
متن کاملHierarchies of keys in secure multicast communications
This work considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. We also introduce the concepts of information lifetime and of information dependence to formalize the intuition tha...
متن کاملA Reliable Key Authentication Schema for Secure Multicast Communications
This paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal of Selected Topics in Signal Processing
سال: 2016
ISSN: 1932-4553,1941-0484
DOI: 10.1109/jstsp.2016.2600518