Font Size: a A A

Research On Key Management Scheme In Secure Multicast Communication

Posted on:2012-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:X W ZhuFull Text:PDF
GTID:2218330368975197Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Internet is more and more popular along with the development of the computer network and the corresponding technology. Multicast is a high data transfer mechanism which sends packet from one or more authorized senders to a very large number of authorized receivers based on Internet. Using multicast technology not only effectively saves network bandwidth and also reduces the resources of group manager. So, many emerging applications (i.e., pay-per-view, online auction, teleconferencing, the remote video conferencing, real-time information services, distributed interactive simulation, collaborative work, and so on) are based upon multicast technology. As the network is open, securing group communication (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical issue in network, and its safety and reliability is more complex than unicast. To alleviate the burden of group manager, multicast technology commonly used with the method that all the users share the same encryption key (group key), and the private encryption key of each user is usually obtained when the user has been registered. Whenever there is a membership change, the group key must also be changed (called re-keying) to prevent backward access control and forward access control. Therefore, the group re-keying to achieve security is another issue of multicast. Efficient algorithm for re-keying is the problem must be solved for the designer, especially in larger number of users and the group membership change frequently.Fristly, the article describes the background of key management schemes, and the content and significance about the research project. And then we outline the status of key management scheme at home and abroad.Secondly, related on the research about multicast communication technology of wired network, we analysis the specific mathematical model of the LKH tree and the effective way of batch rekeying strategies. And then we provide a triggered batch group re-keying based on six-probability-optimization key-tree. Through performance analysis and simulation experiments, we can see that our method not only has great flexibility to adapt to the dynamic change in multicast group membership, but also reduces the overhead of encryptions and communication cost of key manager. So our propose improves the efficiency of group manager and is more suitable for large dynamic multicast group.Then, the article analysis the characteristics of wireless sensor network communication, make the necessary improvements and expansion to the original method used in traditional networks. Designing a structure of network topology related on the energy balance in the wireless sensor to prolong the survival time of the entire network. At the same time, for the environmental factors such as poor and unsafe of wireless sensor networks, a valid key management scheme based on hypersphere is provided to improve the survivability of the network and to reduce the node key storage overhead.Finally, the article points out the problems to be further improved about the subject.
Keywords/Search Tags:secure multicast, wireless sensor network, batch rekeying, multi-level-key, probabilistic organization, hypersphere, energy-awar tree
PDF Full Text Request
Related items