Group key management: algorithms, benchmarking, and reconfigurable architectures

نویسنده

  • Abdulhadi Shoufan
چکیده

PREFACE vii Preface IP multicast is an efficient solution for group communication over the Internet, as both the sender resources and the network bandwidth are relieved with the aid of this emerging technology. However, this superiority suffers, when the group communication must fulfill some security requirements. An essential issue relates to sharing the communication key. Particularly, this key must be updated and securely distributed, every time the group membership changes. This process, which is denoted as group rekeying, raises a scalability problem in large dynamic groups: Rekeying is based on computationally extensive cryptographic operations and on the dissemination of rekeying messages. Thus, the scalability problem presents itself by a computation overhead on both the sender and the receiver sides, and by a communication overhead in the network. Numerous architectures, algorithms, and protocols have been proposed in the literature to cope with this scalability problem. Related work on optimizing rekeying performance mostly concentrates on minimizing the number of required cryptographic operations and thus the length of the rekeying message. An accepted strategy to reduce rekeying costs utilizes batch processing of rekeying requests, which are summed up during a rekeying interval. However, a specification of the maximal length of this rekeying interval is not provided, so far. Too long rekeying intervals cause longer waiting times for new members and longer access times for removed ones. Consequently, a problem of QoS and security is associated with batch rekeying. Because of its novelty and complexity, the work on rekeying optimization lacks a unified way to estimate rekeying performance. In most cases, therefore, an evaluation of different algorithms is impossible. The presented dissertation addresses the above three problems of group rekeying. Firstly, an approach, denoted as Even-Driven Batch Rekeying, is proposed to tackle the QoS and security problems caused by long rekeying intervals in batch rekeying. Secondly, to enable a reliable evaluation of rekeying algorithms, a Rekeying Benchmark is introduced, which provides a unified way to estimate the performance of different rekeying algorithms on the system level. Thirdly, three novel hardware and hardware/software architectures are presented for optimizing the rekeying performance. In contrast to related work, these architectures, denoted as the Real-Time Rekeying Processor, the Batch Rekeying Processor, and the High-Flexibility Rekeying Processor, optimize rekeying not only on the rekeying algorithm level, but also on the cryptography and platform levels. viii ACKNOWLEDGMENTS

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework

Benchmarking digital watermarking algorithms is not an easy task because different applications of digital watermarking often have very different sets of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicated benchmarking tasks and cannot be easily reco...

متن کامل

Introduction to reconfigurable computing - architectures, algorithms, and applications

introduction to reconfigurable computing architectures introduction to reconfigurable computing architectures introduction to reconfigurable computing architectures an introduction to reconfigurable computing new algorithms, architectures and applications for new algorithms architectures and applications for introduction to recon?gurable computing architectures new algorithms architectures and ...

متن کامل

Design and Analysis of Parallel N-Queens on Reconfigurable Hardware with Handel-C and MPI

N-Queens is a classical problem that for many years has been popular for the benchmarking of processing, memory, and communications architectures on high-performance computing systems. The problem is combinatorially hard and involves placing N queens on an N×N chessboard so that no queen can attack any other. The N-Queens problem is well suited for the development and benchmarking of search alg...

متن کامل

Energy Efficient Computing ArchItectures

The CAIRN project-team researches new architectures, algorithms and design methods for flexible, secure, fault-tolerant, and energy-efficient domain-specific system-on-chip (SOC). As performance and energy-efficiency requirements of SOCs, especially in the context of multi-core architectures, are continuously increasing, it becomes difficult for computing architectures to rely only on programma...

متن کامل

A maintenance system model for optimal reconfigurable vibrating screen management

The reconfigurable vibrating screen (RVS) machine is an innovative beneficiation machine designed for screening different mineral particles of varying sizes and volumes required by the customers’ through the geometric transformation of its screen structure. The successful RVS machine upkeep requires its continuous, availability, reliability and maintainability. The RVS machine downtime, which c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007