A Secure Multicast Model Using the Host Identity Protocol
نویسندگان
چکیده
* This project is supported by the NSERC of Canada. Abstract An all-new model of the multicast communication is presented in this paper. It utilizes the architecture of the Host Identity Protocol (HIP), which is being defined by the IETF, and two levels of hierarchical administration to achieve secure authentication of the identity of the group members and administration based on the ISP. It is called HIP-multicast.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملOn Supporting Multicast an
Recently, much effort was applied to enable secure multihoming and mobility for Internet hosts. The Host Identity Indirection Infrastructure (Hi3) is a proposal that combines benefits of Secure-i3 and the Host Identity Protocol (HIP). In this paper, we extend the Hi3 architecture to enable multicast traffic and describe the delegation mechanism in detail. A prototype implementation and prelimin...
متن کاملScalable secure one-to-many group communication using dual encryption
Multicasting is a scalable solution for group communication. Whereas secure unicast is a well-understood problem, scalable secure multicast poses several unique security problems, namely groupmembership control, scalable key distribution to a dynamic group. We address scalability in the pro-posed protocol by using hierarchical subgrouping. Third party hosts or members of the mul...
متن کاملSecurity and Trust of Public Key Cryptography for HIP and HIP Multicast
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this ...
متن کاملEfficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, we propose a scalable, efficient, authenticated group key agreement scheme for large and dynamic multicast systems. The p...
متن کامل