A New Secure Group Management and Communication in End-system Multicast protocol

被引:0
|
作者
El-Sayed, Aymara [1 ,2 ]
机构
[1] Menoufiya Univ, Fac Elect Engn, Comp Sci & Engn Dept, Al Minufiyah, Egypt
[2] Shaqra Univ, Community Coll Alquwaylyah, Comp Sci & Informat Syst Dept, Shagra, Saudi Arabia
关键词
Multicast protocol; Ens-system Multicast; Application-level Multicast; Security; key management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important point in End-System Multicast (ESM), is the security. ESM simplifies the implementation of group communication and is efficient ways to deliver messages to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. The dynamic aspect of group applications due to free membership joins and leaves in addition to members mobility, makes security further challenging in the context of group management/communications. In this paper, a secure group management (i.e. control traffic exchange), based on clustering of group members, is proposed. our proposed of group management is between both (I) the main controller (MRP, Main Rendez-vous Point) and the second controlers (CRP, Cluster RP), and (2) the second controllers and its members. Also, a secure group communication is proposed that is among group members.
引用
收藏
页码:302 / 310
页数:9
相关论文
共 50 条
  • [21] Towards Scalable Key Management for Secure Multicast Communication
    Tseng, Yuh-Min
    Yu, Chen-Hung
    Wu, Tsu-Yang
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (02): : 173 - 182
  • [22] A new group rekeying method in secure multicast
    Xu, Y
    Sun, YX
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 155 - 160
  • [23] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [24] Optimal Key Distribution Scheme for Secure Multicast Group Communication
    Zhou, Zhibin
    Huang, Dijiang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [25] A graph theoretic approach to bounding delay in proxy-assisted, end-system multicast
    Malouch, NM
    Liu, Z
    Rubenstein, D
    Sahu, S
    2002 TENTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2002, : 106 - 115
  • [26] A multicast group communication protocol, engine, and bridge for CORBA
    Moser, LE
    Melliar-Smith, PM
    Narasimhan, P
    Koch, RR
    Berket, K
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2001, 13 (07): : 579 - 603
  • [27] An end-system resource management model with guaranteed quality of service
    Barbar, JS
    Anzaloni, A
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 424 - 429
  • [28] Decentralized group key management for secure multicast communications
    Peyravian, M
    Matyas, SM
    Zunic, N
    COMPUTER COMMUNICATIONS, 1999, 22 (13) : 1183 - 1187
  • [29] A Survey on Dynamic Key Management System in Secure Group Communication
    Parthasarathi, P.
    Shankar, S.
    Nivedha, S.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1440 - 1443
  • [30] An efficient approach to group key management in secure multicast
    Pour, AN
    Kumekawa, K
    Kato, T
    Itoh, S
    Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 218 - 223