A NEW TYPE OF SECURE MULTICAST BASED ON SOURCE TREE

被引:0
|
作者
Wang, Yan [1 ]
Zheng, Jun-Hui [2 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Southwest Univ National Chengdu, Coll Comp Sci & Technol, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure Multicast; Source Tree; Aggregation Router;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A new type of secure multicast based on source tree is investigated. In order to enhence multicast safety, source tree is established from multicast users to the Aggregation Router. This new type of secure multicast could not only support current Internet security technologies and mechanisms, but also has other characteristics due to using source tree. When transmitting network data, this method does not use lP addresses but use virtual circuit identifications on the source tree, which is harder to be attacked and so the multicast security is enhanced.
引用
收藏
页码:216 / 219
页数:4
相关论文
共 50 条
  • [1] Tree-type secure multicast scheme based on digital certificate
    Tian, Wenchun
    Wei, Gang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1815 - 1820
  • [2] Secure source specific multicast based on channel hopping
    Institute of Electronic Technology, Information Engineering University, Zhengzhou 450004, China
    不详
    Jisuanji Gongcheng, 2006, 3 (119-121):
  • [3] Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks
    Devi, D. Suganya
    Padmavathi, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 64 - 69
  • [4] Secure reverse communication in a multicast tree
    Domingo-Ferrer, J
    Martínez-Ballesté, A
    Sebé, F
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 807 - 816
  • [5] Source Specific Centralized Secure Multicast Scheme based on IPSec
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 30 - 35
  • [6] Secure Multi-Source Multicast
    Cohen, Alejandro
    Cohen, Asaf
    Medard, Muriel
    Gurewitz, Omer
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (01) : 708 - 723
  • [7] Logical key tree based secure multicast protocol with copyright protection
    Chen, WT
    Hsu, HL
    Chiang, JL
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 279 - 284
  • [8] MSSIP: A new secure multicast architecture based on SIP
    Wang, Jian
    Cao, Zheng
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 154 - +
  • [9] A dynamic core-based tree scheme for key management in secure multicast
    Xu, ZQ
    Chen, L
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 805 - 812
  • [10] Optimizing the tree structure in secure multicast key management
    Zhu, WT
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (05) : 477 - 479