Differentially secure multicasting and its implementation methods

نویسندگان

  • S. Holeman
  • G. Manimaran
  • James Davis
چکیده

Though the areas of secure multicast group architecture, key distribution, and sender authentication are under scrutiny, one topic that has not been explored is how to integrate these with multilevel security. Multilevel security is the ability to distinguish subjects according to classification levels, which determines to what degree they can access confidential objects. In the case of groups, this means that some members can exchange messages at a higher sensitivity level than others. The Bell-La Padula model [1] outlines the rules of these multilevel accesses. In multicast groups that employ multilevel security, some of these rules are not desirable so a modified set of rules is developed in this paper and is termed differential security. Also, this paper proposes three methods to set up a differentially secure multicast group: (1) Naive approach, (2) Multiple tree differential security (DiffSec) approach, and (3) Single DiffSec tree approach. Our simulation studies show that both Single and Multiple DiffSec tree approaches offer similar performance in terms of bandwidth consumption, which is significantly better than that of the Naive approach. We also discuss the suitability of the schemes taking into account scalability and implementation issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

736 Differentially secure multicasting and its implementation methods

Though the areas of secure multicast group architecture, key distribution and sender authentication are under scrutiny, one topic that has not been explored is how to integrate these with multi-level security. Multi-level security is the ability to distinguish subjects according to classification levels, which determines to what degree they can access confidential objects. In the case of groups...

متن کامل

The VersaKey framework: versatile group key management

Middleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context of multicasting or broadcasting is especially hard when privacy and authenticity is to be assured to highly dynamic groups where the application allows participants to join and leave at any time. Unicast security is well-known and has widely advanced into production ...

متن کامل

Key Management Techniques for Dynamic Secure Multicasting: A Distributed Computing Approach

Most of the Internet applications today require multicasting. For example, software updates, multimedia content distribution, interacting gaming and stock data distribution require multicast services. All of these applications require privacy and authenticity of the participants. Most of the multicasting groups are dynamic and some of them are large in number. Only those users who belong to the...

متن کامل

Role of ANN in Secured Wireless Multicast Routing during Dynamic Channel Allocation for User Demanded Packet Optimality

-------------------------------------------------------------------------ABSTRACT-------------------------------------------------------------------The application of Artificial Neural Network (ANN’s to mobile Ad Hock Network) for multicasting where the problem is to find an efficient route to transmit packets over many nodes in the network. For multicasting in MANETS which address the security...

متن کامل

Doubly Optimal Secure and Protected Multicasting in Hierarchical Sensor Networks

This paper presents the research work addressing optimal secure and protected Multicasting in wired and wireless Hierarchical Sensor Networks (HSN). The multicast nodes in a hierarchical set up are associated with” Importance values” that are normalized into probabilities. The security constraint imposed is associated with the concept of “Prefix-free paths” in the associated graph. The optimali...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001