Performance and Rekeying Analysis of Multicast Security in Lte
نویسندگان
چکیده
Multimedia Broadcast Multicast Services (MBMS) is a point-to-multipoint interface specification for existing and upcoming 3GPP cellular networks, which is designed to provide efficient delivery of broadcast and multicast services, within a cell or within the core network. Target applications include mobile TV and radio broadcasting, file delivery and emergency alerts.The main goal of this paper is to assess the performance of the Secure Multicast Overlay (SMO) and the Group Security Association (GSA). We functionally compare GSA with SMO, in terms of Keys management procedures and look up policies showing that GSA solution is appropriate in certain circumstances and SMO solution is appropriate in others. The comparison will be for different parameters and different services. Also the computational cost and storage cost for Logical Key Hierarchy (LKH) tree with and without dynamic rekeying will be calculated.
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملEfficient rekeying algorithms for WiMAX networks
In this paper, we study the rekeying issue in IEEE 802.16e WiMAX networks. The existing rekeying scheme—the Multicast and Broadcast Rekeying Algorithm (MBRA) unicasts new keys to each subscriber station (SS). This scheme does not scale well since it incurs large communication overheads when the number of SSs increase. In our work, first we propose a general tree-based rekeying scheme, which is ...
متن کاملTowards scalable key management for secure multicast communication
Secure multicast communication allows a sender to deliver encrypted messages to a group of authorized receivers. A practical approach is that the sender uses a common key shared by the authorized receivers to encrypt the transmitted messages. The common key must be renewed to ensure forward/backward secrecy when group members leave/join the group, called the rekeying process. Thus, the rekeying...
متن کاملGroup key management: algorithms, benchmarking, and reconfigurable architectures
PREFACE vii Preface IP multicast is an efficient solution for group communication over the Internet, as both the sender resources and the network bandwidth are relieved with the aid of this emerging technology. However, this superiority suffers, when the group communication must fulfill some security requirements. An essential issue relates to sharing the communication key. Particularly, this k...
متن کاملPerformance Comparison of Stateful and Stateless Group Rekeying Algorithms
Scalable group rekeying schemes proposed in the literature can be classified into three categories: stateful schemes, stateless schemes and self-healing schemes. They differ mainly on the interdependency of rekey messages and messaging overhead in rekeying. Logical key hierarchy (LKH) based approaches are stateful in that members should have received past rekeying messages to decrypt current re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013