Secure Multicast in a WAN

نویسندگان

  • Dahlia Malkhi
  • Michael Merritt
  • Ohad Rodeh
چکیده

A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been shown to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly with the size of the system. For very large networks, for which this is prohibitive, we present two approaches for reducing the cost: First, we show a protocol whose cost is on the order of the number of tolerated failures. Secondly, we show how relaxing the consistency requirement to a probabilistic guarantee can reduce the associated cost, effectively to a constant.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Multicast Group Security Architecture", RFC 3740

This document provides an overview and rationale of the multicast security architecture used to secure data packets of large multicast groups. The document begins by introducing a Multicast Security Reference Framework, and proceeds to identify the security services that may be part of a secure multicast solution.

متن کامل

tMULTICAST SECURITY FRAMEWORK FOR MULTI-SPOT BEAM SATELLITE NETWORK

This article presents an overview of a secure multicast framework as well as a secure multicast system demonstrator used for end-to-end performance assessment of secure multicast service delivery over satellite. The security framework relies on IP security with multicast extensions and Group Domain of Interpretation (GDOI) multicast key management. The framework addresses challenges in the deli...

متن کامل

Ant Colony Optimization Based Approach of Leaker Identification in Secure Multicast

Secure multicasting is used in a wide range of multicast applications such as commercial pay-per-view video multicast and pay-per view digital library. In such applications, there is a possibility that the users might leak the information. To prevent the users from leaking the information and to identify the leakers in the system to protect copyright in a secure multicast environment, a leaker ...

متن کامل

Secure Multicast Communication Using Group Based Multicast Hierarchy

Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providing complete security in such networks. This paper proposes a efficient Group Based Multicast Hierarchy (GBMH) algorithm for secret multicast communication, in which source nodes used ...

متن کامل

Efficient Cluster Based Multicast Tree for Secure Multicast Communication for Mobile Ad Hoc Networks

Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, limited resources such as bandwidth, time and power. Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution in mobile adhoc networks. In many multicast interact...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره cs.CR/9908008  شماره 

صفحات  -

تاریخ انتشار 1997