Font Size: a A A

Design And Realization Of Major Secure Multicast Under IPv6

Posted on:2008-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhaoFull Text:PDF
GTID:2178360242467155Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Multicast allows a sender or more to send data packets to a designate number of receivers of communications technology.The sender using multicast only send a data packet once, and the router supporting multicast will transmit data packets automatically to the designated receivers which have link to send data packets.Therefore multicast can significantly increase communication efficiency while greatly save the transmission network resources, reduce network congestion in the probability.IPv6 is the next-generation Internet standard network protocol.In IPv6,it will provide additional addresses, greater network size, then it will inevitably lead to greater network load, so the dependence on the multicast will be further enhanced.Since joining is unrestricted in Multicast,it is more vulnerable to attack than unicast in communication,with greater risk.Secure Multicast allows only members of this group to send and receive data so security key management becomes the core issue in multicast.Key management ensures that new members can not resolve the packages which are existed before it joins the group,leaving members of the group can not resolve the future content of the packages.For large multicast group,occupied by the preservation of key storage space,Key Generation amount of computation required,occupied by sending the key network bandwidth,the time delay key update and key update frequency will increase accordingly.This paper first discussed the IPv6 multicast elementary knowledge, then analyse typical group key management protocol including the GKMP protocol, the IOLUS protocol, the LKH protocol and the CLIQUE protocol,finally,proposed a kind of large-scale public security multicast architecture and associated key management strategy.According to the IPv6 allocation characteristic,used XOR operation to cause the node recently to join the system,to make the logical position and the physical location unifies.Under the using clock synchronization premise,the multicast source and the subservers use the unified chaos mapping to produce key and synchronized rekey.Causes the subserver to become multicast source's mirror image,and to be responsible for rekey management.Effectively reduced multicast source's load.
Keywords/Search Tags:Multicast, IPv6, Chaos, XOR
PDF Full Text Request
Related items