期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Performance study on Gossip-based group key distribution protocal
1
作者 Yao Yan Ma Jianqing Zhong Yiping Zhang Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期699-704,F0003,共7页
Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast p... Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast protocol can not deal with them fully. Gossip-based group key distribution idea for wide-area dissemination was provided. It is based on an gossip-based loss recovery control mechanism. It can provide a probabilistic reliable guarantee for a information dissemination to reach every group member, which can achieve scalability and reliability. To achieve full reliability, three layers protocol model in group key distribution was provided. One is best effect layer, which provides unreliable dissemination. Other is gossip-based loss recovery layer, which provides probabilistic reliable guarantee. Last is vsync-based layer, which provide deterministic loss recovery. We integrate probabilistic loss recovery method with deterministic one. The model possess scalability that probabilistic method has and full reliability prosthesis by vsync-based. To evaluate the effectiveness of gossip technique in scalable and reliable multicast protocols. We have compared gossip protocol with other reliable multicast protocols. Experimental result shows that gossip protocol has better scalability than other. 展开更多
关键词 key management group key distribution gossip-based reliable multicast RELIABILITY scalability.
下载PDF
Minimum Exact Cover Problem of Group Key Distribution 被引量:2
2
作者 FU Xiong1,2, XU Shouzhi3 1. School of Law ,Wuhan University, Wuhan 430072, Hubei, China 2. Department of Technology, Guangzhou Luogang District People’s Court, Guangzhou 510730, Guangdong, China 3. College of Electronic Engineering and Information Technology, China Three Gorges University, Yichang 443002, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2009年第2期137-142,共6页
Secure group communications are restrained by the number of the group size, number of changes and their distribution, all existing works do not meet the commands of applications with large group size and high dynamic ... Secure group communications are restrained by the number of the group size, number of changes and their distribution, all existing works do not meet the commands of applications with large group size and high dynamic members. In this paper, minimum exact cover problem for group key distribution (GMECP) is presented, and a heuristic solution is testified. Then an algorithm of batch rekeying with renewing cost tending to zero is illustrated, which can process any large number of change requests with best security guaranteed. Efficiency analysis and simulation test show that the achievement can improve the efficiency of any tree-based group key management. 展开更多
关键词 minimum exact cover problem group key distribution secure multicast group key management
原文传递
An Authenticated Group Key Distribution Scheme for Wireless Sensor Networks
3
作者 李林春 李建华 +1 位作者 李生红 潘军 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第3期354-358,共5页
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processi... In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads. 展开更多
关键词 group key distribution AUTHENTICATION exclusion basis system one-way hash chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部