Font Size: a A A

Secure Multicast Group Key Management Scheme

Posted on:2009-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:J BiFull Text:PDF
GTID:2208360245461676Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the extensive application and popularization of Internet and video/audio technology, more and more application of multimedia and high-bandwidth appear, the technology of multicast can reduce bandwidth and alleviate the server load, these characters of multicast will provide more perfect support and wider foreground for those new applications. Inevitably, multicast suffers from the similar security threats like unicast transmissions, however, the security mechanisms in unicast can not be directly applied to multicast in this situation, secure multicast, which supplies multicast with security mechanisms is becoming a hot research spot on network, in which a secure and effective group key management is the most challenging work.This thesis begins with an introduction of multicast techniques, the security requirements and multicast security hierarchy. We also classified existing multicast management schemes. Among which, several typical schemes are compared and analyzed, and the problems in exiting schemes is also given. On the basis of plentiful research on the merits and drawbacks of existing group key management schemes, this thesis tries to improve the existing mainstream schemes. It proposed a new multicast key management schemes based on multiple-level and region approach for large dynamic multicast. Its design principles, architecture and key updating algorithms are also given. The schemes are compared with several related existing schemes; the schemes are evaluated using the following four metrics: key storage, encryption complexity, communication costs and protection against attacks. Compared with LKH and Iolus, it efficiently decreases some overheads such as communication delays and bandwidth.In addition, we analysis the functions of the system and summarize the whole design scheme of the multicast system. Second we particularly analysis every important module's realization, the network topology, the system structure. At last, we complete the system function test in its applying environment. The test results indicate that the system realized has fulfilled the requests of our design...
Keywords/Search Tags:multicast security, group key management, logical key hierarchy, re-keying
PDF Full Text Request
Related items