A New Secure Group Management and Communication in End-system Multicast protocol

被引:0
|
作者
El-Sayed, Aymara [1 ,2 ]
机构
[1] Menoufiya Univ, Fac Elect Engn, Comp Sci & Engn Dept, Al Minufiyah, Egypt
[2] Shaqra Univ, Community Coll Alquwaylyah, Comp Sci & Informat Syst Dept, Shagra, Saudi Arabia
关键词
Multicast protocol; Ens-system Multicast; Application-level Multicast; Security; key management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important point in End-System Multicast (ESM), is the security. ESM simplifies the implementation of group communication and is efficient ways to deliver messages to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. The dynamic aspect of group applications due to free membership joins and leaves in addition to members mobility, makes security further challenging in the context of group management/communications. In this paper, a secure group management (i.e. control traffic exchange), based on clustering of group members, is proposed. our proposed of group management is between both (I) the main controller (MRP, Main Rendez-vous Point) and the second controlers (CRP, Cluster RP), and (2) the second controllers and its members. Also, a secure group communication is proposed that is among group members.
引用
收藏
页码:302 / 310
页数:9
相关论文
共 50 条
  • [31] Effective video multicast over wireless Internet: Rate allocation and end-system based adaptation
    Yin, H
    Lin, C
    Zhuang, JJ
    Li, B
    Ni, Q
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1395 - 1402
  • [32] A new secure group key management scheme for multicast over wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 23 - +
  • [33] Approximation and Heuristic Algorithms for End-System Based Application-Layer Multicast for Voice Conferences
    Lin, Hwa-Chun
    Yang, Hsiu-Ming
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 517 - 525
  • [34] Scalable key management for secure multicast communication in the mobile environment
    Cao, Jiannong
    Liao, Lin
    Wang, Guojun
    PERVASIVE AND MOBILE COMPUTING, 2006, 2 (02) : 187 - 203
  • [35] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [36] End-to-end secure group communication for the Internet of Things
    Lizardo, Andre
    Barbosa, Raul
    Neves, Samuel
    Correia, Jaime
    Araujo, Filipe
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [37] Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'
    Xia, Zhe
    Yang, Yu
    Miao, Fuyou
    IET INFORMATION SECURITY, 2023, 17 (02) : 309 - 314
  • [38] Secure Multicast Group Management and Key Distribution in IEEE 802.21
    Hanatani, Yoshikazu
    Ogura, Naoki
    Ohba, Yoshihiro
    Chen, Lidong
    Das, Subir
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 227 - 243
  • [39] On Group Key Management for Secure Multicast Employing the Inverse Element
    Zhu, Wen Tao
    Deng, Robert H.
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 337 - +
  • [40] Cryptanalysis of two group key management Protocols for secure multicast
    Zhu, WT
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 35 - 48