Font Size: a A A

Self Organized Hierarchical Key Management Scheme For Application Layer Multicast

Posted on:2012-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:X XiaFull Text:PDF
GTID:2218330338963500Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
ALM is a kind of multicast communication, Implemented in the terminal host, sending multicast datagram from single or multi-hosts to the group through the traditional unicast connection to the group. Because not changing the traditional unicast model of the Internet and not depending on its underlying implementation, ALM has been applied widely. But with the Internet security problems have become increasingly serious, ensuring the communication of information among the group members, restricting non-group members of the group to access the content of communications become extremely important. Encrypting communication data by the group key and ensure non-group hosts not have permission to obtain the key is a safe and effective way to ensure group communication, which also introduces the group key management issues.Firstly, this paper has a brief introduction of ALM and reviews the theoretical study and leading technology at home and abroad. Then we focused on the security attributes, issues and design principles of group key management, introduced the mainstream key management schemes and their strengths and weaknesses. Based on this, Self Organized hierarchical Key Management Scheme for application layer multicast-SOKM is proposed, the main contents include the following:1. Based on Hierarchical clustering key management scheme, realizing the control information and data information transfer topology multicast transmission.2. The concept of self-organization is introduced, includes two aspects: firstly, the cluster members self select the head node; secondly, head node is responsible for selecting the KS of cluster, which transfers the task of the traditional key server to a trusted node of each cluster.3. Dynamic selection mechanism is introduced, and KS node is dynamic selected by the comprehensive performance of each node in cluster. This mechanism reduces the probability of KS being attacked and the key generation, updating, distribution bottlenecks.Finally, the simulation proves that SOKM effectively reduces the probability of KS being attacked and delay of group key distribution, ensures forward and backward confidentiality of multicast data, improves the security of whole multicast group and key distribution efficiency, so has good scalability.
Keywords/Search Tags:hierarchical clustering, key server, key management, application layer multicast, self-organization
PDF Full Text Request
Related items