Font Size: a A A

The Research Of Mobile IP Secure Multicast Algorithm

Posted on:2006-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q WeiFull Text:PDF
GTID:2178360182960501Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With mobile devises promulgating rapidly, mobile technology developing quickly, the integration of mobile and multicast bring a lot of new problems: the old multicast routing protocol only care the static nodes, if the moving nodes are taken as the leave or join nodes, so the multicast tree must be built quickly, the communicated and computed spending is very large. The multicast routing protocols will take the moving nodes as the joining or exiting nodes. The IPv6 protocol draft has given two basic algorithms: home subscription and remote subscription. Many researcher analyzes the algorithm, then put off many advanced algorithm, such as: MoM, RBMoM, PS and MMROP. All of the multicast applications in the internet have secure needs, but all of the algorithm talked above do not care secure, they only solved how the mobiles efficiently participate in the multicasting. This paper analyzes mobile multitasking's secure need, and put forward evaluating standards. FHSR is the first advance algorithm; it integrates of RS and HS. It can adapt source multicasting and reduce the tunnel's length. Then use previous net subscription replace HS, use MMROP replace RS, the FPSM is the new algorithm that can reduce the asynchronism of the multicast data and key. If mobile nodes move more quickly, the new multicasting tree needs rebuilding frequently and new keys need rekeying without using. So the interval rekeying is introduced, the secure of the interval rekeying and the factors affected the interval is discussed. Using Boolean function minimized the rekeying messages, and the minimized performance in discussed. At last , using network simulation simulated the improved algorithm, and analyzes the result.
Keywords/Search Tags:mobile multicast, first PS second MMROP, interval, batch rekeying, Minimization, network simulation
PDF Full Text Request
Related items