Font Size: a A A

Research On Key Management Scheme In Security Multicast

Posted on:2008-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhanFull Text:PDF
GTID:2178360272467797Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As the 1 affects n phenomenon and the important overhead induced by decryption / reencryption operations, most proposed multicast key management scheme do not fit the high dynamic multicast group. The adaptive and scalable key management scheme take the membership change behavior into consideration, solve these two problems in some aspects.In fact, the AS scheme is a hierarchy multicast key management approach. Through dividing the subgroups into different clusters, subgroups in the same cluster share the common Traffic Encryption Key, only one subgroup in every cluster need carry out the decryption / reencryption operations, also has the disadvantage of attenuating the 1 affects n phenomenon. Introduced the AS agent entity which is responsible for key management of the subgroup in every subgroup. A agent can transform between two states, root agent of every cluster is active, while all the inner agents are passive. Only the active agent need carry out the decryption / reencryption operations.The core solution of AS approach is the Tree Partitioning Problem. According to the frequency of membership change behavior in different subgroup, adjust the division of the clusters, its goal is to minimize the overhead induced by decryption / reencryption operations and the 1 affects n phenomenon. Periodically AS agents exchange dynamism information about their subgroups. Based on these information, each agent estimates and compare the two costs, then begins the merge / split subgroups operations. At last a new division of the clusters which fit well the present membership change behavior is formed.Simulation results show that the parameterαcharacterizing the weight given to a decryption/reencryption operation plays a key role in the operation and the performance of the AS approach, also give a representative situation in which the AS approach is very efficient. As the parameterαgets lager, the AS approach gradually becomes a centralized solution.
Keywords/Search Tags:Adaptive and Scalable key Management Scheme, Subgroup Merge and Split, Multicast, Key Management
PDF Full Text Request
Related items