期刊文献+

集中式安全组播动态组控制授权算法

A Centralized Warrant Distributing and Updating Approach for Secure Multicast Group Control
下载PDF
导出
摘要 针对组播安全通信以及动态控制组成员通信关系的问题,提出将密钥包含在授权信息中分发给用户的授权算法·用户通过认证身份获取相应组播地址上的发送、接收权限,由控制中心动态更新通信结点授权,并采用加密算法与类型字映射表以增大破解难度·验证结果表明,采用该算法的组播安全传输系统能够做到在控制中心对机密组进行实时的划分和调整,以达到控制用户通信关系或动态抗破解的目的· In order to control the communication relation actively in secure multicast, an approach is proposed, which distributes warrant containing secret key. Users get warrant in order to communicate in some multicast group. The group controller can update the users' warrants to change the users' communicate relation. This approach also uses an encryption algorithms and types' mapping table to increase the security. The result shows that this approach can set several smaller secure groups in a multicast group and change the users' communication relation actively, so as to act against attack or control the communication relation.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第8期1391-1397,共7页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展规划基金项目(2002CB312105)~~
关键词 组播 授权分发 动态更新 机密组 multicast warrant distributing active updating secure group
  • 相关文献

参考文献13

  • 1徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 2朱文涛,熊继平,李津生,洪佩琳.安全组播中密钥分配问题的研究[J].软件学报,2003,14(12):2052-2059. 被引量:18
  • 3H Harney, C Muckenhirn. RFC2093. Group Key Management Protocol (GKMP) Specification [S]. 1997. http://rfc. net/rfc2093. html
  • 4H Harney, C Muckenhirn. RFC2094. Group Key Management Protocol (GKMP) Architecture [S].1997. http://rfc. net/rfe2094. html
  • 5R Poovendran, S Ahmed, S Corson, et al. A scalable extension of group key management protocol [R]. Institute for systems research, Tech Rep: 98-14, 1998
  • 6Hao Chu, Lintian Qiao, Klara Nahrstedt, et al. A secure multicast protocol with copyright protection [J]. ACM Computer Communication Review Journal, 2002, 32(2): 42-60
  • 7D Wallner, E Harder, R Agee. RFC 2627. Key management for multicast : Issues and architectures[S]. 1999. http://rfc.net/rfc2627. html
  • 8Chung Kei Wong, Mohamed Gouda, Simon S Lam. Secure group communications using key graphs [ C]. ACM SIGCOMM 1998, Vancouver, British Columbia, 1998
  • 9R Poovendran, J S Baras. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes [J]. IEEE Trans on Information Theory,2001, 47(7): 2824-2834
  • 10D Balenson, D McGrew, A Sherman, Key management for large dynamic groups: One-way function trees and amortized initialization[S]. IETF Internet Draft, 2000. http://www.securemulticast. org/smug3-balenson. pdf

二级参考文献32

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部