Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Multi User Security

Multi User Security

Ratings: (0)|Views: 25 |Likes:
Published by s.reegan
computer network
computer network

More info:

Published by: s.reegan on Dec 20, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

12/19/2009

pdf

text

original

 
ABSTRACTTitle of Dissertation: MULTI-USER SECURITY FOR MULTICAST COMMUNICATIONSThe ubiquity of communication networks is facilitating thedevelopment of wireless and Internet applications aimed at allowingusers to communicate and collaborate amongst themselves. In thefuture, group-oriented services will be one of the dominant servicesthat facilitate real-time information exchange among a large number of diverse users. However, before these group-oriented services can be successful deployed, technologies must be developed to guaranteethe security of the information and data exchanged in groupcommunications. Among all security requirements of groupcommunication, access control is paramount as it is the first line of defense that prevents unauthorized access to the groupcommunication and protects the value of application data. Accesscontrol is usually achieved by encrypting the data using a key that isshared among all legitimated group members. The problem of accesscontrol becomes more difficult when the content is distributed to adynamic group with user joining and leavingthe service for a variety of reasons. Thus, Group Key Management isrequired to achieve key update with dynamic group membership.Existing group key management schemes seek to minimize either theamount of rounds needed in establishing the group key, or the size of 
 
the key updating messages. They do not, however, considering thevarying requirements of the users, the underlying networks or theapplications. Those generic solutions of access control often yieldlarge consumption of communication, computation and storageresources, especially for large groups with highly dynamicmembership in heterogeneous networks. In addition, the design of existing key management schemes focus on protecting the applicationdata, but introduces vulnerabilities in protecting the statistics of groupmembership information. This poses severe security concern invarious group applications. The focus of this dissertation is to designnetwork-specific and application specific group key management andsolve the security vulnerability of key management that revealsdynamic group membership information. This dissertation will present scalable group key management in heterogeneous wirelessnetwork, the hierarchical access control for multimedia applications,and a framework of securing dynamic group membership informationover multicast. The main contribution of this dissertationis to advance the group key management research to achieve higher level of scalability and security.MULTI-USER SECURITY FOR MULTICASTCOMMUNICATIONSTABLE OF CONTENTS1 Introduction 1
 
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Security Issues in Group Communications . . . . . . . . . . . . . . 31.2.1 Access Control and Data Confidentiality . . . . . . . . . . . 31.2.2 Service Authentication and Verification . . . . . . . . . . . . 41.3 Key Management for Group Access Control . . . . . . . . . . . . . 61.3.1 Centralized Key Management . . . . . . . . . . . . . . . . . 61.3.2 Contributory Key Management . . . . . . . . . . . . . . . . 91.4 Thesis Overview and Contribution . . . . . . . . . . . . . . . . . . 132 Topology-aware Key Management for Wireless Networks 192.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192.2 Topology-Matching Key Management Tree . . . . . . . . . . . . . . 202.3 Handoff Schemes for TMKM Tree . . . . . . . . . . . . . . . . . . . 252.4 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 292.5 Separability of the Optimization Problem . . . . . . . . . . . . . . . 342.6 Design of the TMKM Tree . . . . . . . . . . . . . . . . . . . . . . . 362.6.1 Dynamic membership model . . . . . . . . . . . . . . . . . . 372.6.2 ALX tree structure . . . . . . . . . . . . . . . . . . . . . . . 382.6.3 User subtree design . . . . . . . . . . . . . . . . . . . . . . . 432.6.4 BS subtree design . . . . . . . . . . . . . . . . . . . . . . . . 432.6.5 SH subtree design . . . . . . . . . . . . . . . . . . . . . . . . 452.7 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 482.7.1 One-SH systems . . . . . . . . . . . . . . . . . . . . . . . . . 482.7.2 Multiple-SH systems . . . . . . . . . . . . . . . . . . . . . . 513 Hierarchical Group Access Control 573.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->