Font Size: a A A

Research Of Secure Multicast Key Management Schema Based On LKH

Posted on:2008-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:G K ZhaoFull Text:PDF
GTID:2178360272968045Subject:Information security
Abstract/Summary:PDF Full Text Request
With the fast popularization and development of the Internet, lots of high bandwidth multimedia application was produced, combining voice, video and text over IP. Because the multicast technique can alleviate the bottleneck of the network, it was used extensively in the high bandwidth applications. The Internet group management agreement Internet Group Management Protocol offer for the group member joining and quiting mechanism, but it was lack of security. There was three typical security problems: user management, source authentication and key management. And key management is the most difficult.After analyzing key management scheme, LKH key management scheme is facused, which have been researched member's joining and quiting carefully. Meanwhile, others variant scheme based on LKH are also analyzed, including OFC,OFCT and NHT.At last, a new key management scheme based on LKH is introduced and discussed carefully including member's joining, quiting and security. Comparing with LKH, our scheme has greatly improved. Hash function is adopted to compute key and the schema can choose the key which will be updated according to path label.In order to prove the superiority in performance of the new scheme, the article analyzing the performance in the respect of the amount of the key, renewal amount of key of member adding and quiting. and compared with LKH , OFC,OFCT and NHT.In researching on key management methods, considering little discussion of key tree, we introduce LKHTreeManager key tree management schema , which includes AVL algorithm ,BFT algorithm and LKH Key Tree balancing algorithm. The place which will be inserted or deleted can be located quickly with the three algorithms, and the tree can be adjusted to balance quickly. Not only the schema is designed mainly for highly dynamic secure group communication systems, but also it would be useful for general secure group communication systems.
Keywords/Search Tags:Secure Multicast, Key Management, Logic Key Hierarchy Tree, LKHTreeManager
PDF Full Text Request
Related items