Font Size: a A A

Members Authenctication Protocol Desigh And Key Management Scheme Of Secure Multicast

Posted on:2010-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y YanFull Text:PDF
GTID:2178360332957874Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Multicast technology is a new and efficient mechanism for network transmission. It provides one to many and many to many communications strategy, which can effectively save network bandwidth and reduce network load, Therefore so multicast technology have a wide range of applications in real-time data transmission, multimedia conferencing, online games and many other fields. But security problems have hampered the further application of multicast technology.Although the security of uni-cast already have a better solution, but because multicast architecture is more complex than unicast communication, so many problems still exist in security of multicast communication and many of them require further research. Multicast communication needs more requirements in security, including: privacy, group authentication, source authentication (Non-denial), anonymity and integrity. Among them, group member authentication and key management is the core problems of multicast security.The research works presented in this thesis mainly focused on the two problems we mentioned above.First of all, this thesis listed some existing group member authenticated technology and focused on Kerberos authentication protocol. Then we analyzed three versions of Internet Group Management Protocol (IGMP). Finally we proposed a new authentication protocol KIGMP (Kerberos Authenticate Internet Group Management Protocol), using the scalability of IGMPv3 (The third version of IGMP), which can authenticate and manage group members at the same time.Secondly, we studied some typical group key management protocol including GKMP (Group Key Management Protocol), Iolus Protocol, Clique protocol, OPT (One-Way Function Trees) protocol and LKH (Logical Key Hierarchy) protocol. Then we focused on LKH scheme, the time complexity for rekeying reduced to O (log n ) from O ( n ) by using of LKH scheme, where n is the number of group members. This is an excellent contribution to multicast key management, so a great number of studies on key management were based on LKH. This thesis proposed a new scheme based on the probability of group members, which can maintain the optimal structure of LKH key tree dynamically and can reduce the network flow of key updating effectively.
Keywords/Search Tags:Multicast Security, Group Member Authentication, IGMPv3, Group Key Management, LKH
PDF Full Text Request
Related items