Secure Group Communication for Mobile P2P Groups: A Survey

نویسنده

  • Zinaida Benenson
چکیده

This report presents an overview over secure group communication paradigms in ad hoc networks, with especial attention to join and leave algorithms. Although classical group communication, after more than 25 years of development, is by now well understood and formalized, group communication for ad hoc networks is still under development. Firstly, the paradigm of groups in distributed computing is considered, distinguishing between classical, multicast and mobile ad hoc groups. Purpose, features, and system architecture of group communication systems are presented in the light of historical evolution of this concept. Further, security issues in group communication are outlined, focusing on the changes to the system architecture which are necessary for making a group communication system secure. Finally, an overview over group key management in group communication is given.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks

Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of secure groups with distributed applications running upon them. Existing approaches to secure group communication cannot satisfy these requirements. In this paper, an automated secure group management approach is presen...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks

Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among dynamic group of participants. However, most of them suffer ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007