Network-Aware Security for Group Communications (eBook)
XVIII, 304 Seiten
Springer US (Verlag)
978-0-387-68848-0 (ISBN)
This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).
Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications.This book aims to fill a growing need in the research community for a reference that describes the state of the art in securing group communications. Network-Aware Security for Group Communications focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).
Preface 6
Contents 11
Introduction 16
1.1 Book Overview 18
Centralized Multi-user Key Management 22
2.1 Basic Multicast Information Theory 22
2.2 Overview of Multicast Key Management 26
2.3 Requirements for Centralized Group Key Management 28
2.4 Basic Polynomial Interpolation Scheme 30
2.5 Extending to a Scalable Protocol 34
2.6 Architectural Considerations 41
2.7 Chapter Summary 51
Group Key Agreement Techniques in Heterogeneous Networks 53
3.1 Introduction 53
3.2 Group DH Overview 55
3.3 Conference Trees and the Butterfly Scheme 57
3.4 Computational Considerations 63
3.5 Efficiency and Feasibility Evaluation 70
3.6 System Sensitivity to False Costs 76
3.7 Chapter Summary 82
Optimizing Rekeying Costs in Group Key Agreement 84
4.1 Join-Exit Tree for Reducing Latency in Key Agreement Protocols 85
4.2 Optimizing Rekeying Cost 98
4.3 Chapter Summary 123
Optimizing Multicast Key Management for Cellular Multicasting 125
5.1 Targeting Property of Rekeying Messages 126
5.2 Topology-aware Key Management 127
5.3 Topology-aware Key Management in Cellular Wireless Network 127
5.4 Performance Analysis 134
5.5 Separability of the Optimization Problem 138
5.6 Optimizing TMKM Tree Design 139
5.7 Performance Evaluation 148
5.8 Chapter Summary 154
Key Management and Distribution for Securing Multimedia Multicasts 155
6.1 A Basic Key Management Scheme 157
6.2 Distribution of Rekeying Messages for Multimedia 160
6.3 An Improved Rekeying Message Format 167
6.4 System Feasibility Study 178
6.5 Extensions to Multilayered Services 181
6.6 Chapter Summary 182
Hierarchical Access Control for Multi- Group Scenarios 186
7.1 Hierarchical Access Control: Problem Formulation 187
7.2 Centralized Multi-group Key Management Scheme 190
7.3 Performance Measures and Analysis 195
7.4 Simulations and Performance Comparison 200
7.5 Contributory Multi-group Key Management 207
7.6 Related Work 210
7.7 Chapter Summary 211
Protecting Membership Information in Secure Multicasting 213
8.1 GDI Disclosure in Centralized Key Management Schemes 214
8.2 Defense Techniques 223
8.3 Optimization 228
8.4 Simulations 231
8.5 GDI Disclosure and Protection in Contributory Key Management Schemes 233
8.6 Chapter Summary 238
Reducing Delay and Enhancing DoS Resistance in Multicast Authentication 240
9.1 Background Literature and TESLA 241
9.2 Staggered TESLA: Multi-Grade Multicast Authentication 245
9.3 Reduced-Delay Multicast Authentication Schemes 252
9.4 Buffer Requirements and Tradeoffs 255
9.5 Simulations and Performance Analysis 260
9.6 Conclusion 271
An Authentication Service for Sensor and Ad Hoc Networks 273
10.1 Introduction 273
10.2 TESLA and TESLA Certificates 276
10.3 Overview of the Authentication Framework 278
10.4 Certificates 280
10.5 Certificate Renewal 282
10.6 Entity Authentication 283
10.7 Roaming and Handoff 285
10.8 Data Origin Authentication 286
10.9 Evaluation 288
10.10 Conclusion 290
References 294
Index 308
Erscheint lt. Verlag | 17.10.2007 |
---|---|
Zusatzinfo | XVIII, 304 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
Naturwissenschaften | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | ACCESS • Access Control • Architecture • authentication • broadcast • Communication • denial of service • Information • Multimedia • security |
ISBN-10 | 0-387-68848-X / 038768848X |
ISBN-13 | 978-0-387-68848-0 / 9780387688480 |
Haben Sie eine Frage zum Produkt? |
Größe: 4,2 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich