A New Secure Group Management and Communication in End-system Multicast protocol

被引:0
|
作者
El-Sayed, Aymara [1 ,2 ]
机构
[1] Menoufiya Univ, Fac Elect Engn, Comp Sci & Engn Dept, Al Minufiyah, Egypt
[2] Shaqra Univ, Community Coll Alquwaylyah, Comp Sci & Informat Syst Dept, Shagra, Saudi Arabia
关键词
Multicast protocol; Ens-system Multicast; Application-level Multicast; Security; key management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important point in End-System Multicast (ESM), is the security. ESM simplifies the implementation of group communication and is efficient ways to deliver messages to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. The dynamic aspect of group applications due to free membership joins and leaves in addition to members mobility, makes security further challenging in the context of group management/communications. In this paper, a secure group management (i.e. control traffic exchange), based on clustering of group members, is proposed. our proposed of group management is between both (I) the main controller (MRP, Main Rendez-vous Point) and the second controlers (CRP, Cluster RP), and (2) the second controllers and its members. Also, a secure group communication is proposed that is among group members.
引用
收藏
页码:302 / 310
页数:9
相关论文
共 50 条
  • [1] Key management for secure multicast group communication in mobile networks
    Kostas, T
    Kiwior, D
    Rajappan, G
    Dalal, M
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 41 - 43
  • [2] New Key Tree Management Protocol for the Efficiency of Storage and Computation Time in Secure Multicast Communication
    Je, Dong-Hyun
    Seo, Seung-Woo
    2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 653 - 657
  • [3] IGAP: Secure group management protocol for multicast content delivering network
    Hayashi, T
    Tanabe, A
    Andou, D
    Izutsu, K
    Satou, H
    He, HX
    Tawbi, W
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 626 - 630
  • [4] A Secure Key Distribution Protocol for Multicast Communication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Subramanian, S. Siva
    CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 249 - +
  • [5] End-system architecture for unified congestion management
    Rahul, Hariharan S.
    Balakrishnan, Hari
    Seshan, Srinivasan
    Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, 1999, : 52 - 57
  • [6] Efficient key distribution protocol for secure multicast communication
    Kim, B
    Cho, HJ
    Lee, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 1007 - 1016
  • [7] Comparison of end-system lPv6 protocol stacks
    Zeadally, S
    Wasseem, R
    Raicu, I
    IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (03): : 238 - 242
  • [8] Key Management for Secure Multicast Communication: A Survey
    Baddi, Youssef
    Ech-Cherif El Kettani, Mohamed Dafir
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [9] A Secure Group Membership verification protocol for IP multicast
    Hardjono, T
    Cain, B
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 9 - 15
  • [10] Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Deborah, L. Jegatha
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 878 - 894