A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multicast security: a taxonomy and some efficient constructions
1999
IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)
Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns. ...
Next we address two major security problems of multicast communication: source authentication, and key revocation. ...
Acknowledgments We are very thankful to Shai Halevi, Rosario Gennaro and Tal Rabin, for discussions on the problems and possible solutions for multicast security. ...
doi:10.1109/infcom.1999.751457
dblp:conf/infocom/CanettiGIMNP99
fatcat:be62ca2ygzbx7nvjv3kyvma5v4
Secure Multicast Key Distribution for Mobile Ad Hoc Networks
[article]
2010
arXiv
pre-print
A comparison is done against some pertinent performance criteria. ...
Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. ...
This paper extends and presents taxonomy of multicast key distribution protocols, dedicated to operate in ad hoc networks for secure multicast communications. ...
arXiv:1003.1799v1
fatcat:5gcy3vdnybhcfpuydjrfzcimra
Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions
[chapter]
2010
Network Security
Multicast is an efficient technique to distribute data to a large group of users. ...
The group key must be updated and redistributed to all authorized users in a secure and reliable fashion whenever a user joins or leaves the group. ...
We focus on scalable and centralized group rekeying, which has become the mainstream of research on secure multicast recently. ...
doi:10.1007/978-0-387-73821-5_3
fatcat:in2t5bvv3vgklo7fy2wkjvrlle
Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
2013
IEEE Transactions on Wireless Communications
Both analytical and simulation results have been provided to demonstrate the efficacy and efficiency of our proposed scheme. ...
Index Terms-Wireless multicast, network coding, Markov decision process, security, denied-of-service attack. ...
ACKNOWLEDGMENT The authors would like to thank the Associate Editor and anonymous reviewers for their thorough reading and constructive comments which improved the quality of the paper. ...
doi:10.1109/twc.2013.062413.121557
fatcat:rn6sjg4iobdavnbpzpscvschxm
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
2008
Journal of automated reasoning
This paper shows a formal capability of capturing some features of secure multicast protocols. ...
requirements, concluding with a secure distribution of a secret key. ...
Formal models and verification of secure multicast and secure data streaming. ...
doi:10.1007/s10817-008-9112-7
fatcat:nopakqcnffdlppnupjacjhay6m
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks
2010
International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks
Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. ...
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). ...
Energy efficiency and security are some challenges faced in MANETs, especially in designing a routing protocol. ...
doi:10.5121/jgraphoc.2010.2201
fatcat:iuvltpmdh5ek5n2trvwwudqa2y
Comparative study of multicast authentication schemes with application to wide-area measurement system
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
Among these MA schemes, SCU+ is an MA scheme we constructed from an MTS scheme designed for secure code update, and TSV+ is our patched version of TSV, an MA scheme which we show to be vulnerable. ...
security levels. ...
Yee Wei Law is partly supported by the Institute for a Broadband-Enabled Society, the ARC under the Discovery Project grant DP1095452, and the EC under contract FP7-ICT-2009-257992 "SmartSantander". ...
doi:10.1145/2484313.2484349
dblp:conf/ccs/LawGLMP13
fatcat:qwwolmqcm5gdzl3jfqbuoh4xzu
Multicast Routing Authentication System using Advanced Tesla
2011
International Journal of Computer Applications
The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer ...
Throughout this base paper, the main focus of discussion will be on the popular multicast authentication scheme Timed Efficient Stream Loss-tolerant Authentication (TESLA) based upon the delayed key disclosure ...
Analysis of the Protocol
MULTICAST SECURITY: A TAXONOMY AND SOME EFFICIENT CONSTRUCTIONS Multicast communication is becoming the basis for a growing number of applications. ...
doi:10.5120/2025-2738
fatcat:2dwgctayc5hahagoso2qrtqlhy
11. Application-Layer Multicast
[chapter]
2005
Lecture Notes in Computer Science
Since the first appearance of the host-group model, a lot of research and standardization effort has been put into ubiquitous multicast natively implemented on routers (network-layer service). ...
Clearly, network-layer multicast and, in particular, its de facto Any-Source Multicast standard (the Any-Source Multicast model is implemented in the PIM-SM/MBGP/MSDP protocol suite) is violating the end-to-end ...
Design Aspects and Taxonomy The ultimate goal of an ALM scheme is to build an efficient overlay network and thus to maximize the service quality received by the service consumers (group members). ...
doi:10.1007/11530657_11
fatcat:ijv6cf4syzfnpiie2owmuub4u4
Research on multicast routing protocols for mobile ad-hoc networks
2008
Computer Networks
To provide a comprehensive understanding of these multicast routing protocols and better organize existing ideas and work to facilitate multicast routing design for MANETs, we present the taxonomy of the ...
Hence, reliable multicast routing plays a significant role in MANETs. However, to offer effective and reliable multicast routing is difficult and challenging. ...
Acknowledgements The authors wish to thank the reviewers and the editors for their valuable suggestions and comments that helped improve the paper. ...
doi:10.1016/j.comnet.2007.11.016
fatcat:5onmqu2ojbe7lijegd3uxngjsa
Multicast Routing Protocols for Mobile ADHOC Networks
2019
International Journal of Engineering and Advanced Technology
Multicast routing is concurrently sending a message from single source to several destinations and it is an efficient approach to establish the communication between groups of nodes in the wireless network ...
There are several multicast routing protocol has been proposed to overcome the challenges of multicast routing and play very significant roles in the current scenario. ...
Temporary and wireless adhoc networks can be constructed using the multicast routing protocols and it plays a significant part. ...
doi:10.35940/ijeat.a1029.1091s19
fatcat:ooj2ylci7jccjayy4blmbhfgue
A Survey on Multicasting in Software-Defined Networking
2018
IEEE Communications Surveys and Tutorials
We then present a survey of existing and proposed approaches to security for IP multicast and SDN multicast. ...
We present a survey of existing multicast routing protocols in IP multicast, and a survey of existing and proposed multicast routing algorithms in SDN multicast. ...
William Atwood was provided in part by the Natural Sciences and Engineering Research Council of Canada, through its Discovery Grants program. ...
doi:10.1109/comst.2017.2776213
fatcat:4me7qfrjgnhthifholvkwl3s24
Engineering multicast group key distribution: a review
2005
IEE Proceedings - Software
Such networks are more likely to have device nodes with reduced 1 A method has t-forward security [13] if and only if no t colluding evicted multicast group members can read any future communications. ...
Mobile and wireless networks for multicast [26] introduce bandwidth restrictions, which for some applications have implications on key distribution latency, and which in its turn is related to message ...
The authentication, key distribution software, and test applications have been constructed by means of the Java programming language, which includes a substantial set of security libraries and extensions ...
doi:10.1049/ip-sen:20045069
fatcat:jdcdgz7uu5hy5hi75erv2f7nl4
A taxonomy of multicast data origin authentication: Issues and solutions
2004
IEEE Communications Surveys and Tutorials
The lack of security obstructs a large deployment of this efficient communication model. ...
TAXONOMY OF MULTICAST DATA ORIGIN AUTHENTICATION PROTOCOLS In Fig. 7 we classify existing multicast data origin authentication protocols depending on the security objective in a first stage. ...
doi:10.1109/comst.2004.5342292
fatcat:5usvoxeufnb7np5ty56fedjgsi
Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network
2017
International Journal of Advanced Computer Science and Applications
The paper then discusses the beneficial factor and limiting factor in existing multicast techniques and highlights the research gap in this. ...
This paper contributes to show a present scenario of multicast routing performance in WSN and thereby assists the readers about the possible direction of future with clear visualization of system architecture ...
balancing [20] , security [21] , energy efficiency [22] , etc. ...
doi:10.14569/ijacsa.2017.080941
fatcat:ww5bwwnsvrh7xgl55bo6hfe3me
« Previous
Showing results 1 — 15 out of 964 results