964 Hits in 5.4 sec

Multicast security: a taxonomy and some efficient constructions

R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas
1999 IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)  
Yet, existing security protocols for multicast offer only partial solutions. We first present a taxonomy of multicast scenarios on the Internet and point out relevant security concerns.  ...  Next we address two major security problems of multicast communication: source authentication, and key revocation.  ...  Acknowledgments We are very thankful to Shai Halevi, Rosario Gennaro and Tal Rabin, for discussions on the problems and possible solutions for multicast security.  ... 
doi:10.1109/infcom.1999.751457 dblp:conf/infocom/CanettiGIMNP99 fatcat:be62ca2ygzbx7nvjv3kyvma5v4

Secure Multicast Key Distribution for Mobile Ad Hoc Networks [article]

D. SuganyaDevi, G.Padmavathi
2010 arXiv   pre-print
A comparison is done against some pertinent performance criteria.  ...  Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power.  ...  This paper extends and presents taxonomy of multicast key distribution protocols, dedicated to operate in ad hoc networks for secure multicast communications.  ... 
arXiv:1003.1799v1 fatcat:5gcy3vdnybhcfpuydjrfzcimra

Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions [chapter]

Sencun Zhu, Sushil Jajodia
2010 Network Security  
Multicast is an efficient technique to distribute data to a large group of users.  ...  The group key must be updated and redistributed to all authorized users in a secure and reliable fashion whenever a user joins or leaves the group.  ...  We focus on scalable and centralized group rekeying, which has become the mainstream of research on secure multicast recently.  ... 
doi:10.1007/978-0-387-73821-5_3 fatcat:in2t5bvv3vgklo7fy2wkjvrlle

Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

Tuan T. Tran, Hongxiang Li, Guanying Ru, Robert J. Kerczewski, Lingjia Liu, Samee U. Khan
2013 IEEE Transactions on Wireless Communications  
Both analytical and simulation results have been provided to demonstrate the efficacy and efficiency of our proposed scheme.  ...  Index Terms-Wireless multicast, network coding, Markov decision process, security, denied-of-service attack.  ...  ACKNOWLEDGMENT The authors would like to thank the Associate Editor and anonymous reviewers for their thorough reading and constructive comments which improved the quality of the paper.  ... 
doi:10.1109/twc.2013.062413.121557 fatcat:rn6sjg4iobdavnbpzpscvschxm

Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks

Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi
2008 Journal of automated reasoning  
This paper shows a formal capability of capturing some features of secure multicast protocols.  ...  requirements, concluding with a secure distribution of a secret key.  ...  Formal models and verification of secure multicast and secure data streaming.  ... 
doi:10.1007/s10817-008-9112-7 fatcat:nopakqcnffdlppnupjacjhay6m

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks

Busola S. Olagbegi, Natarajan Meghanathan
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task.  ...  This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).  ...  Energy efficiency and security are some challenges faced in MANETs, especially in designing a routing protocol.  ... 
doi:10.5121/jgraphoc.2010.2201 fatcat:iuvltpmdh5ek5n2trvwwudqa2y

Comparative study of multicast authentication schemes with application to wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
Among these MA schemes, SCU+ is an MA scheme we constructed from an MTS scheme designed for secure code update, and TSV+ is our patched version of TSV, an MA scheme which we show to be vulnerable.  ...  security levels.  ...  Yee Wei Law is partly supported by the Institute for a Broadband-Enabled Society, the ARC under the Discovery Project grant DP1095452, and the EC under contract FP7-ICT-2009-257992 "SmartSantander".  ... 
doi:10.1145/2484313.2484349 dblp:conf/ccs/LawGLMP13 fatcat:qwwolmqcm5gdzl3jfqbuoh4xzu

Multicast Routing Authentication System using Advanced Tesla

V. Ganesh Babu, T. Senthil Kumar
2011 International Journal of Computer Applications  
The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer  ...  Throughout this base paper, the main focus of discussion will be on the popular multicast authentication scheme Timed Efficient Stream Loss-tolerant Authentication (TESLA) based upon the delayed key disclosure  ...  Analysis of the Protocol MULTICAST SECURITY: A TAXONOMY AND SOME EFFICIENT CONSTRUCTIONS Multicast communication is becoming the basis for a growing number of applications.  ... 
doi:10.5120/2025-2738 fatcat:2dwgctayc5hahagoso2qrtqlhy

11. Application-Layer Multicast [chapter]

Kostas Katrinis, Martin May
2005 Lecture Notes in Computer Science  
Since the first appearance of the host-group model, a lot of research and standardization effort has been put into ubiquitous multicast natively implemented on routers (network-layer service).  ...  Clearly, network-layer multicast and, in particular, its de facto Any-Source Multicast standard (the Any-Source Multicast model is implemented in the PIM-SM/MBGP/MSDP protocol suite) is violating the end-to-end  ...  Design Aspects and Taxonomy The ultimate goal of an ALM scheme is to build an efficient overlay network and thus to maximize the service quality received by the service consumers (group members).  ... 
doi:10.1007/11530657_11 fatcat:ijv6cf4syzfnpiie2owmuub4u4

Research on multicast routing protocols for mobile ad-hoc networks

Luo Junhai, Xue Liu, Ye Danxia
2008 Computer Networks  
To provide a comprehensive understanding of these multicast routing protocols and better organize existing ideas and work to facilitate multicast routing design for MANETs, we present the taxonomy of the  ...  Hence, reliable multicast routing plays a significant role in MANETs. However, to offer effective and reliable multicast routing is difficult and challenging.  ...  Acknowledgements The authors wish to thank the reviewers and the editors for their valuable suggestions and comments that helped improve the paper.  ... 
doi:10.1016/j.comnet.2007.11.016 fatcat:5onmqu2ojbe7lijegd3uxngjsa

Multicast Routing Protocols for Mobile ADHOC Networks

2019 International Journal of Engineering and Advanced Technology  
Multicast routing is concurrently sending a message from single source to several destinations and it is an efficient approach to establish the communication between groups of nodes in the wireless network  ...  There are several multicast routing protocol has been proposed to overcome the challenges of multicast routing and play very significant roles in the current scenario.  ...  Temporary and wireless adhoc networks can be constructed using the multicast routing protocols and it plays a significant part.  ... 
doi:10.35940/ijeat.a1029.1091s19 fatcat:ooj2ylci7jccjayy4blmbhfgue

A Survey on Multicasting in Software-Defined Networking

Salekul Islam, Nasif Muslim, J. William Atwood
2018 IEEE Communications Surveys and Tutorials  
We then present a survey of existing and proposed approaches to security for IP multicast and SDN multicast.  ...  We present a survey of existing multicast routing protocols in IP multicast, and a survey of existing and proposed multicast routing algorithms in SDN multicast.  ...  William Atwood was provided in part by the Natural Sciences and Engineering Research Council of Canada, through its Discovery Grants program.  ... 
doi:10.1109/comst.2017.2776213 fatcat:4me7qfrjgnhthifholvkwl3s24

Engineering multicast group key distribution: a review

C. Vidakis, M. Fleury
2005 IEE Proceedings - Software  
Such networks are more likely to have device nodes with reduced 1 A method has t-forward security [13] if and only if no t colluding evicted multicast group members can read any future communications.  ...  Mobile and wireless networks for multicast [26] introduce bandwidth restrictions, which for some applications have implications on key distribution latency, and which in its turn is related to message  ...  The authentication, key distribution software, and test applications have been constructed by means of the Java programming language, which includes a substantial set of security libraries and extensions  ... 
doi:10.1049/ip-sen:20045069 fatcat:jdcdgz7uu5hy5hi75erv2f7nl4

A taxonomy of multicast data origin authentication: Issues and solutions

Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah
2004 IEEE Communications Surveys and Tutorials  
The lack of security obstructs a large deployment of this efficient communication model.  ...  TAXONOMY OF MULTICAST DATA ORIGIN AUTHENTICATION PROTOCOLS In Fig. 7 we classify existing multicast data origin authentication protocols depending on the security objective in a first stage.  ... 
doi:10.1109/comst.2004.5342292 fatcat:5usvoxeufnb7np5ty56fedjgsi

Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network

Nandini G, J. Anitha
2017 International Journal of Advanced Computer Science and Applications  
The paper then discusses the beneficial factor and limiting factor in existing multicast techniques and highlights the research gap in this.  ...  This paper contributes to show a present scenario of multicast routing performance in WSN and thereby assists the readers about the possible direction of future with clear visualization of system architecture  ...  balancing [20] , security [21] , energy efficiency [22] , etc.  ... 
doi:10.14569/ijacsa.2017.080941 fatcat:ww5bwwnsvrh7xgl55bo6hfe3me
« Previous Showing results 1 — 15 out of 964 results