Font Size: a A A

Research On Ip Multicast-based Key Management Technology

Posted on:2011-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z W LiangFull Text:PDF
GTID:2198330338979963Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
More and more groups application appear duing the process of rapid development of internet, the maturity of social multimedia technology and social informatization, such as stock information distribution, video conferencing, cooperation computing system, pay TV, network games, distributed simulation and mirror image synchronization and so on. These groups application all need the capacity of sending the same information from one host to multiple hosts or from multiple hosts to multiple hosts. Although you can use unicast application of technology to achieve these groups, but the use of IP multicast technology can greatly save network bandwidth resources and the resources of the sender, and the use of multicast can reduce the delay.Although useing IP multicast to realize group communication can achieve significant savings in bandwidth resources and the expansion of group communication systems, but due to lacking of effective support of traffic management, accounting, reliability and security, IP Multicast Application is also very limited. Among these multicast security is one of the key factors, for example, distributing stock information by multicast requires: providing a confidential mechanism to make users who did no order the information can not access these shares information; providing effective and reliable authentication mechanism to the data information authentication. The pay-TV application system, requires only paying customers can receive the related television programs. The mechanism of IP multicast distribution and the open characteristic of current IP multicast model makes multicast communication open vulnerable to DoS attacks. In recent years, many scholars have done a lot of research according to these security requirements and security flaws, and have made some achievements, for example, lots of effective group key management algorithm appear. But there is still lack of research in some areas in intensive or extensive, such as multicast source authentication, IP Multicast group access control sender and receiver, integrated framework unifing all of these safety factors and strategy management. In order to achieve business and even military applications demand, there is a great deal of work to do for IP multicast.The function of Group Key Management Protocol is to solve security problems of group management, including two aspects: one is the key distribution, the other is to manage key to deal with the change of group members relationship. The technology of multicast key management in present network, has been gradually close to maturity, from the most simple centralized management, distributed management, and hierarchical grouping style management to the relatively new threshold encryption technology and elliptic curves encryption technology. This article is based on the existing multicast network environment, study the key management technology based on IP multicast environment according to threshold technology and elliptic curves technology.
Keywords/Search Tags:IP multicast, minimal covering, key management, elliptic curve cyptosystem, threshold techniques
PDF Full Text Request
Related items