CERIAS Tech Report 2004-59 ON THE PERFORMANCE OF GROUP KEY AGREEMENT PROTOCOLS

نویسندگان

  • YAIR AMIR
  • YONGDAE KIM
  • CRISTINA NITA-ROTARU
چکیده

Group key agreement is a fundamental building block for secure peer group communication systems. Several group key management techniques were proposed in the last decade, all assuming the existence of an underlying group communication infrastructure to provide reliable and ordered message delivery as well as group membership information. Despite analysis, implementation and deployment of some of these techniques, the actual costs associated with group key management have been poorly understood so far. This resulted in an undesirable tendency: on the one hand, adopting sub-optimal security for reliable group communication, while, on the other hand, constructing excessively costly group key management protocols. This paper presents a thorough performance evaluation of five notable distributed key management techniques (for collaborative peer groups) integrated with a reliable group communication system. An in-depth comparison and analysis of the five techniques is presented based on experimental results obtained in actual local-and wide-area networks. The extensive performance measurement experiments conducted for all methods offer insights into their scalability and practi-cality. Furthermore, our analysis of the experimental results highlights several observations which are not obvious from the theoretical analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CERIAS Tech Report 2004-42 ASSESSING STUDENT PERFORMANCE OUTCOMES IN AN INFORMATION SECURITY RISK ASSESSMENT, SERVICE LEARNING COURSE by

This focus of this paper is on the assessment of student performance in an information security risk assessment, service learning course. The paper provides a brief overview of the information security risk assessment course as background information and a review of relevant educational assessment theory with a focus on outcomes assessment. An example of how assessment theory was applied to thi...

متن کامل

CERIAS Tech Report 2004-03 RTML: A ROLE-BASED TRUST-MANAGEMENT MARKUP LANGUAGE

RT is a framework for Role-based Trust Management [20]. In comparison with systems like SPKI/SDSI and KeyNote, the advantages of RT include: a declarative, logic-based semantic foundation, support for vocabulary agreement, strongly-typed credentials and policies, more flexible delegation structures, and more expressive support for Separation-of-Duty policies. This paper describes advances in th...

متن کامل

CERIAS Tech Report 2004-74 A FRAMEWORK FOR ROLE-BASED ACCESS CONTROL IN GROUP COMMUNICATION SYSTEMS

In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access control in client-server group communication systems. Our framework combines rolebased access control mechanisms with environment parameters (time, IP address, etc.) to provide support for a wide range of applications wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005