Elements of trusted multicasting
نویسندگان
چکیده
Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. In this paper, we consider fundamental security issues in building a trusted multicast facility. We discuss techniques for group-based data en-cryption, authentication of participants, and preventing unauthorized transmissions and receptions.
منابع مشابه
Group Rekeying for Secure Multicast Using Genetic Algorithm and Aco Based Approaches
Multicasting is a service that delivers data from a source to a group of recipients which reduces the network’s bandwidth and also the transmission overhead in the sender. Privacy and authentication must be ensured in multicast distribution for applications, where it is important to restrict the set of receivers and authenticate the data source. Key management plays a significant role to ensure...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملFault-Tolerant Multicasting in Multistage Interconnection Networks
In this paper, we study fault-tolerant multicasting in multistage interconnection networks (MINs) for constructing large-scale multicomputers. In addition to point-to-point routing among processor nodes, efficient multicasting is critical to the performance of multicomputers. This paper presents a new approach to provide fault-tolerance multicasting, which employs the restricted header encoding...
متن کاملTree-Based Multicasting on Wormhole Routed Multistage Interconnection Networks
In this paper, we propose a tree-based multicasting algorithm for Multistage Interconnection Networks. We rst analyze the necessary conditions for deadlocks in MINs. Based on these observations, an asyn-chronous tree-based multicasting algorithm is developed in which deadlocks are prevented by serializing the initiations of branching operations that have potential for creating deadlocks. The se...
متن کاملData Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has ...
متن کامل