Network Simulation of Group Key Management Protocols
نویسندگان
چکیده
: The need for rapidly configurable, secure communication among groups of participants has resulted in the study of group key agreement protocols. The study of these protocols has been primarily theoretical. In this paper, we present the results of simulation studies of the methods provided by four group-key agreement protocols, EGK, TGDH, STR and CCEGK. The results of the simulation clarify the theoretical metrics, but also provide insight into the actual relative impact of the metrics, specifically the impact of synchronization. Overall CCEGK performed better in all categories than the other three protocols.
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملA comparative performance analysis of reliable group rekey transport protocols for secure multicast
Scalable group rekeying is one of the important problems that needs to be addressed in order to support secure multicast communications for large and dynamic groups. One of the challenging issues that arises in scalable group rekeying is the problem of delivering the updated keys to the members of the group in a reliable and timely manner. In this paper, we present a new scalable and reliable k...
متن کاملAdaptive Group Key Management Protocol for Wireless Communications
Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an important building bloc in securing group communication, has received a particular attention in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, video...
متن کاملKey Management for Secure Multicast in Hybrid Satellite Networks
This paper proposes a design for key management for secure multicast in hybrid satellite networks. Communication satellites offer an efficient way to extend IP multicast services for groups in wide-area networks. In order to be commercially viable, the multicast traffic should be accessible only to paying subscribers. Access control can be achieved by data encryption. This requires secure and e...
متن کاملNetwork Working Group M. Baugher Request for Comments: 4046
This document defines the common architecture for Multicast Security (MSEC) key management protocols to support a variety of application, transport, and network layer security protocols. It also defines the group security association (GSA), and describes the key management protocols that help establish a GSA. The framework and guidelines described in this document permit a modular and flexible ...
متن کامل