Font Size: a A A

On IP Multicast Nodes Classification And Key Management Technology

Posted on:2013-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:R H GeFull Text:PDF
GTID:2268330392467968Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays, a growing number of group applications appear in Internet suchas video conferencing, information distribution and so on. Most of theseapplications send the same from one node to multiple nodes or from multiplenodes to multiple nodes. Traditional IP unicast technology cannot handle theseapplications very well, and it will cause a lot of duplicate data sent to a waste ofnetwork bandwidth resources. IP multicast technology can provide a greatsolution for these group applications. IP multicast does not have a wide range ofuse due to lacking of security controls, traffic management and other reasons.In order to preserve insecurity factors and accomplish identitycertification,secure communication in IP multicast, this paper built a secure IPmulticast service model on which we accomplished multicast keymanagement.This key management scheme needs the information exchangebetween member nodes. First,we devided nodes in IP multicast into differentgroups in order to ensure the efficiency of communications.And then this paperproposed a grouping quality model based on group coupling degree with analysisof the factors that influence the network communication, and then designed aclassification algorithm based on the route similarity of route tree. According tothe results of the simulation shows that some performance parameters includesRTT, hops, packet loss rate and so on can be obtained for this algorithm. Withthese parameters, average group coupling degree can be calculated. Incomparison with random grouping algorithm and benchmark based algorithm,this algorithm improves grouping quality.This paper proposed a scheme using threshold technology and elliptic curvecryptography based on effective nodes classification in IP multicast. Themulticast key distribution, recovery and update can be achieved by establishingan IP multicast service system.We designed an experiment and discussed the costof management and it indicates that this scheme can accomplish key managementin IP multicast. This scheme solves the problem of user authentication effectivelyand privilege management and it can achieve secure multicast.
Keywords/Search Tags:Nodes Classification, Threshold, ECC, IP Multicast
PDF Full Text Request
Related items