期刊文献+

一种高效的Wimax安全组播密钥管理方案 被引量:1

A Efficient Key Management Scheme in Secure Multicast for Wimax
下载PDF
导出
摘要 组播密钥管理是Wimax组播服务安全的核心问题,为了适应大型Wimax组中成员频繁进出的情景,文中在"多重秘密共享"和"秘密组播机制"的基础上,设计了一种新的适合于周期密钥更新策略的Wimax安全组播密钥管理方案SGMBM,该方案根据组中成员关系的动态变化来分发管理密钥。和已有经典方案的对比结果显示,SG-MBM获得了更少的组密钥更新数量和能量消耗,并保证了前向和后向安全性。 Group key management is a core issue of secure muhicast for Wimax. In order to adapt frequent operations of members in the large Wimax groups, based on the basis of "multiple secret sharing" and "secret multicast mechanism", this paper designed a new kind of rekeying scheme in secure multicast for Wimax, which is suitable for period rekeying strategy named SGMBM. Finally the security of the scheme was proved. Simulation results showed it has fewer group key update frequencies and energy consumption, and obtains the forward and backward security.
作者 鲁蔚锋 吴蒙
出处 《南京邮电大学学报(自然科学版)》 北大核心 2013年第2期8-13,共6页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)(2011CB302903) 国家自然科学基金(61201160) 国家242信息安全计划(2012A138) 江苏省高校自然科学研究重点项目(10KJA510035) 江苏高校优势学科建设工程(yx002001) 南京邮电大学引进人才科研启动基金(NY212012)资助项目
关键词 WIMAX 组播服务 组播密钥管理 周期密钥更新 Wimax muhicast/broadcast service key management in multicast period rekeying strategy
  • 相关文献

参考文献11

  • 1GEORGIOS K, ELISAVET K, STEFANOS G. Revisiting WiMAX MBS security [ J ]. Computers and Mathematics with Applications, 2010,60(2) :217 -223.
  • 2IEEE. STD 802.16e IEEE standard for local and metropolitan area networks,Part 16: Air interface for fixed and mobile broadband wireless access systems ; Amendment 2 : Physical and medium ac- cess control layers for combined fixed and mobile operation in li- censed bands and amendment and corrigendum[ S]. 2006.
  • 3李晖,刘志国,程琳静,胡也.基于逻辑密钥树的组播密钥管理研究进展[J].北京理工大学学报,2011,31(5):547-551. 被引量:6
  • 4HUANG C T, CHANG J M. Responding to security issues in Wimax networks [ J]. IT Professional,2008, l0 (5) : 15 - 21.
  • 5FAN Jinliang, JUDGE P,AMMAR M H. HySOR: Group key man- agement with collusion-scalability [ C ]//11 th International Confer- ence on Computer Communications and Networks. 2002:196 -201.
  • 6SUN H M, CHANG S Y, CHEN S M, et al. An efficient rekeying scheme for muhicast and broadcast (M&B) in mobile WiMAX [ C]//Asia-Pacific Services Computing Conference. 2008 : 199 - 204.
  • 7LU Chunli, JIA Xiaoqi, LIN Jingqiang, et al. Efficient secret sharing schemes [ C ] //8th FTRA International Conference. 2011 : 114 -121.
  • 8DEININGER A, KIYOMOTO S, KURIHARA J, et al. Security vul- nerabilities and solutions in mobile WiMAX[ J ]. International Jour- nal of Computer Science and Network Security, 2007,7 ( 11 ) : 7 -15.
  • 9KENT A D, LIEBROCK L M. Secure communication via shared knowledge and a salted hash in Ad-hoc environments [ C ] // IEEE 35th Annual International Conference on Computer Software and Applications ( COMPSACW). 2011 : 122 - 127.
  • 10SHAMIR A. How to share a secret [ J ]. Communication of the ACM, 1979,22 ( 11 ) :612 - 613.

二级参考文献24

  • 1Wallner D, Harder E, Agee R. Key management for multicast ; issues and archltectures[DB/OL]. [1999-06 012. http ://tools. letf. orghtmlrfe2627.
  • 2Chung K W, Gouda M, Lam S S. Secure group commu- nications using key graphs [J]. IEEE/ACM Transactions on Networking, 2000,8(1) :16 - 30.
  • 3Challal Y, Seba H. Group key management protocols: a novel taxonomy[J]. International Journal of Information Technology, 2005,2(1) : 105 - 118.
  • 4Moyer M J, Rao J R, Rohatgi P. A survey of security issues in multicast communications [J]. Network IEEE, 1999,13(6): 12 - 23.
  • 5Rafaeli S, Hutchison D. A survey of key management for secure group communication[J]. ACM Computing Surveys (CSUR), 2003,35(3) :309 - 329.
  • 6Sherman A T, McGrew D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5) :444 - 458.
  • 7Harney H, Muckenhirn C, Rivers T. Group key management protocol (GKMP) specification[DB/OL]. [1997-07-02]. http ://tools. ietf. orghtmlrfc2093.
  • 8Harney H, Muekenhirn C, Rivers T. Group key management protocol (GKMP) architecture[DB/OL]. [ 1997-07-06]. http ://tools. ietf. orghtmlrfe2094.
  • 9Steiner M, Tsudik G, Waidner M. CLIQUES: a new approach to group key agreement[C] // Proceedings of the 18th International Conference on Distributed Computing Systems. Amsterdam, Netherlands: IEEE, 1998:380 - 387.
  • 10Ateniese G, Steiner M, Tsudik G. Authenticated group key agreement and friends[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. San Francisco, USA: ACM Press, 1998:17 - 26.

共引文献5

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部