Font Size: a A A

Research Of Group Key Management On IPv6 Secure Multicast

Posted on:2008-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:W Q LiuFull Text:PDF
GTID:2178360272470081Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet recently, the applications of multi-media net meeting, distributed network game, distributing data and software updating are more and more. But all of these bring us problems of bandwidth using up and network congestion at the same time. Because multicast can save network bandwidth, reduce sender resources and network traffic, people has focused on multicast research more and more. On the other hand, with the drying up of IPv4 addresses and the expanding of net scale and resource requirement, many countries have gone about the research of applications on IPv6. Multicast on IPv6 has been supported well, devices working for IPv6 network all support multicast function, but devices on many IPv4 network do not support this function.Thanks to the limitation of architecture IKAM and Iolus, considering of new characters of IPv6 multicast, such as large multicast address spaces and one multicast group could span multi IPv6 router or subnet, we brought forward the multicast architecture GCASM on IPv6. It based on the research of project-CNGI large-scale routing and multicast technology of Chinese Development and Reforming Committee and aimed at large-scale, dynamic multicast network. It separated multicast members into different CD (Control Domain) with address mapping mechanism,got the result that a small world-CD could demonstrate the performance of whole IPv6 multicast network. It then supposed some multicast parameter to"recognize"the group member for providing different multicast service. In this way, the security, reliability, anti-attacking and expansibility of multicast network could be improved.After analyzing the advantages of MARKS and LKH algorithm, thinking over factors of member's reliability, we found that security of member's behavior related to its settling time length and frequency (behavior it joins and leaves the group) in this multicast group. So we designed a key management algorithm-QoSKM based on different multicast service for different group member in a small world, used for key management in individual CD(Control Domain). It established member state variables, knew in advance related member's dynamic behavior, and then provided different multicast service. Therefore when rekeying, the traffic load and the computing quantity had correspondingly reduced ( long-time user not need to rekey just because of short-time user's behavior). The manager in control domain had also less key storage because the LKH key tree level had been reduced (because of 2 LKH key trees). After comparing the performance of QoSKM algorithm to that of other algorithms, such as MARKS, OFT and LKH, QoSKM might obtain other algorithms'strongpoint, but also overcome their insufficiency. With architecture GCASM it might extremely smoothly adapt to network scale expansion, very fit for large-scale, dynamic, multi-App network.
Keywords/Search Tags:IPv6, LKH, Secure Multicast, Key Management Algorithm, Key Renewing, Secure Multicast System Design, Performance Evaluation
PDF Full Text Request
Related items