Font Size: a A A

Research And Simulation On Mobile IP Multicast Technology And Security

Posted on:2013-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y B SongFull Text:PDF
GTID:2248330395456293Subject:Measuring and Testing Technology and Instruments
Abstract/Summary:PDF Full Text Request
With the continuous development of network technology, the Internet has becomean indispensable part in our daily life. However, as an important implication in mobilenetwork, multimedia technology has proposed severe challenges in terms of suchproblems as width resources, network congestion, and network delay. Therefore, thetechnology, multicast, has drawn great attention and study, which can effectively takeadvantage of network resources. Especially in mobile network, multicast caneffectively save width resources. However, the problem of security that multicastbrings hinders the application of multicast in mobile environment. This thesis conductsa research on the management technology of the group key of IP multicast and on theauthentication technology of multicast source, whose details are as follows.The key part in achieving the safety of the multicast data lies in the managementof group key. On the basis of the deep analysis of the group key management and themulticast characteristics in mobile environment, in terms of new group membersentering, leaving, and frequent switching, this thesis puts forward the group keymanagement scheme based on LKH, which integrates advantages of both thecentralized management technology and distributed management technology together.The analyses show that this management technology can guarantee the safety andupdate the group key rapidly at the same time. In the meantime, it does not requirehigh performance of multicast components, which leads to a small amount ofcalculation and communications.The authentication of the multicast source is another important issue. In terms ofthe high rate of packet loss in mobile environment, this thesis proposes a authenticationscheme of multicast source, based on threshold cryptography, for preventing packetloss in mobile environment, which can adjust threshold parameters automaticallyaccording to the network situation to achieve the authentication of multicast source. Inorder to test and verify the performance and feasibility of this scheme, this thesisexpanded the authentication module of multicast source in mobile IPv6environmenton NS platform, established network topology to make simulation, and made analysesof the simulation results. The results show that this scheme is of good feasibility,occupies a small part of bandwidth, and can efficiently achieve the authentication ofanti-packet loss in unstable channels in mobile environment.
Keywords/Search Tags:MIPv6, Mobile Multicast Multicast, Source Authentication, Group Key Management, NS-2
PDF Full Text Request
Related items