Secrecy Rate Optimization for Secure Multicast Communications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy & Rate Adaptation for secure HARQ protocols

This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdropper. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions. This problem has been investigated in the literature using a coding scheme that involves a unique secrecy ...

متن کامل

Secure communications with an asymptotic secrecy model

As knowledge based systems become more sophisticated, communications between systems or among their subsystems often conducted over public channels such as the Internet, wireless medium, etc. To secure communications over public channels, the most often used method is Diffie and Hellman’s public key infrastructure approach. This method requires a trusted third party to verify identifies, which ...

متن کامل

Optimization-Based Congestion Control for Multicast Communications

Widespread deployment of multicast depends critically on the existance of congestion control protocols that are provably fair to unicast traffic. In this work, we present an optimization-based congestion control mechanism for one-to-many communication with provable fairness properties. The optimization-based approach attempts to find an allocation of rates that maximizes the aggregate utility o...

متن کامل

Hierarchies of keys in secure multicast communications

This work considers the key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. We also introduce the concepts of information lifetime and of information dependence to formalize the intuition tha...

متن کامل

A Reliable Key Authentication Schema for Secure Multicast Communications

This paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal of Selected Topics in Signal Processing

سال: 2016

ISSN: 1932-4553,1941-0484

DOI: 10.1109/jstsp.2016.2600518