Font Size: a A A

A Scheme On Security Multicast Key Management

Posted on:2014-10-13Degree:DoctorType:Dissertation
Country:ChinaCandidate:J G HuaFull Text:PDF
GTID:1318330398955460Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the popularity and wide application of Internet, multicast communication technology has also been a rapid development. Multicast technology is suitable for point to multipoint, multipoint to multipoint data transmission. Compared with unicast, the main advantage of multicast is that the sender is allowed to send message only once and the router automatically forwards the message to all intended receivers, thus save network bandwidth and resources of sender and reduce network traffic. However, the reliability and security issues become more complex than unicast. In multicast communication, all members share a group key used to encrypt the group data. Group membership is dynamic. In order to ensure that members can not decrypt the group data before joining the group or after leaving the group, you must update the group key. The key security management in the multicast security issues is an important research topic, has become a research hotspot.At present, multicast is applied widely and multicast technology is also appropriate to perfect, but in new applications, such as in the P2P environment, how to solve the problem of anonymity of P2P nodes; how to solve the problem that whether the user is a group member while the node movement from one subnet to another subnet in the mobile environment; in IPv6some new features are facing new challenges to multicast. Therefore, the research of security management in different environment has urgency and necessity. Therefore, the content is as follows.First, in the P2P environment, P2P node is anonymity and the communication of security multicast users must be registered. On the basis of meeting the P2P anonymity and the security requirements of multicast communication, a relatively complete multicast key management scheme is formed. P2P network traffic not only accounted for more than40%of the total flow, but also has a growing trend. As P2P widely used and some of the characteristics of P2P network, problems have become increasingly prominent. Due to the random and spontaneous of nodes and distributed systems management mechanism without a central server control in lack of concentration, there are several problems in terms of availability and security. Nodes are in lack of mutual trust and the necessary incentives to encourage active contribution to the resources. Additionally, nodes in the structural network the topology changes as a result of users joining or leaving lead to the problem for availability which cause users to lose interest. Safety is also an important aspect of P2P networks. P2P network makes the application layer multicast and group application increasingly popular. How to ensure application security group is an important research topic. Second, in IPv6environment, according to the characteristics of IPv6with the existing key management methods to form a relatively complete large dynamic multicast key management scheme. As a successor to IPv4, IPv6are enhanced in terms of functionality and performance. And now, IPv6multicast is still at the stage of standardization. IPv6protocol and multicast technology as the recently popular field of study and the corresponding protocols and standards are constantly formulation, discussion and change, which require our active participation in research, development and practice. Therefore, in IPv6network environment a number of important applications, especially multicast technology based on IPv6need to be further study. Meanwhile, with the increase in applications and broaden the application areas, for the IPv6multicast environment, the demand for data security is increasingly surfaced. Security is a key issue in multicast deployment.Third, according to the characteristics of movement, moving a node from one subnet to another subnet, how to determine whether the node is the original reiterated node, and how to securely communicate, etc relatively complete multicast key management scheme is formed. As wireless technology mature, people access the network anytime, anywhere using a variety of wireless devices. It is necessary to support mobile communications for the communication development. In a mobile environment, due to the mobile node using a wireless link, obvious feature is the limited link bandwidth, high error rate, smaller storage capacity and low processing power as result of its small size. The characteristics of efficiently using resources for IP multicast can effectively compensate for the lack of mobile nodes. Combination multicast technology with mobile technology, in mobile networks the security of multicast communication has become an important research area. Multicast in mobile environment should not only consider the characteristics of mobile hosts (such as limited resources and energy), the wireless communication features (such as narrow bandwidth, delay, poor reliability), but also consider the features caused by host mobility. That is, the dynamic nature of the membership and the dynamic nature of the location, quite a large of members and quite dispersed members.In these environments, we have higher security requirements to multicast communication, but related research is very little. This paper will analyze new features in the new security multicast environment, focusing on research on the large dynamic key management strategies in the mobile environment, P2P environment and the IPv6environment, and structuring various types of experimental environment. And then the key management algorithm is tested. At last, secure multicast in the application development environment is explored. This paper will study the above issues and propose solutions to better address security multicast communication technology in the current security environment to meet the growing demand for secure multicast. It has practical significance for the promotion and popularization of secure multicast communication in the new environment.
Keywords/Search Tags:Security Multicast, key Management, P2P, IPv6, Large Dynamic
PDF Full Text Request
Related items