E-Book, Englisch, 304 Seiten
Sun / Trappe / Liu Network-Aware Security for Group Communications
1. Auflage 2007
ISBN: 978-0-387-68848-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 304 Seiten
ISBN: 978-0-387-68848-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;6
2;Contents;11
3;Introduction;16
3.1;1.1 Book Overview;18
4;Centralized Multi-user Key Management;22
4.1;2.1 Basic Multicast Information Theory;22
4.2;2.2 Overview of Multicast Key Management;26
4.3;2.3 Requirements for Centralized Group Key Management;28
4.4;2.4 Basic Polynomial Interpolation Scheme;30
4.5;2.5 Extending to a Scalable Protocol;34
4.6;2.6 Architectural Considerations;41
4.7;2.7 Chapter Summary;51
5;Group Key Agreement Techniques in Heterogeneous Networks;53
5.1;3.1 Introduction;53
5.2;3.2 Group DH Overview;55
5.3;3.3 Conference Trees and the Butterfly Scheme;57
5.4;3.4 Computational Considerations;63
5.5;3.5 Efficiency and Feasibility Evaluation;70
5.6;3.6 System Sensitivity to False Costs;76
5.7;3.7 Chapter Summary;82
6;Optimizing Rekeying Costs in Group Key Agreement;84
6.1;4.1 Join-Exit Tree for Reducing Latency in Key Agreement Protocols;85
6.2;4.2 Optimizing Rekeying Cost;98
6.3;4.3 Chapter Summary;123
7;Optimizing Multicast Key Management for Cellular Multicasting;125
7.1;5.1 Targeting Property of Rekeying Messages;126
7.2;5.2 Topology-aware Key Management;127
7.3;5.3 Topology-aware Key Management in Cellular Wireless Network;127
7.4;5.4 Performance Analysis;134
7.5;5.5 Separability of the Optimization Problem;138
7.6;5.6 Optimizing TMKM Tree Design;139
7.7;5.7 Performance Evaluation;148
7.8;5.8 Chapter Summary;154
8;Key Management and Distribution for Securing Multimedia Multicasts;155
8.1;6.1 A Basic Key Management Scheme;157
8.2;6.2 Distribution of Rekeying Messages for Multimedia;160
8.3;6.3 An Improved Rekeying Message Format;167
8.4;6.4 System Feasibility Study;178
8.5;6.5 Extensions to Multilayered Services;181
8.6;6.6 Chapter Summary;182
9;Hierarchical Access Control for Multi- Group Scenarios;186
9.1;7.1 Hierarchical Access Control: Problem Formulation;187
9.2;7.2 Centralized Multi-group Key Management Scheme;190
9.3;7.3 Performance Measures and Analysis;195
9.4;7.4 Simulations and Performance Comparison;200
9.5;7.5 Contributory Multi-group Key Management;207
9.6;7.6 Related Work;210
9.7;7.7 Chapter Summary;211
10;Protecting Membership Information in Secure Multicasting;213
10.1;8.1 GDI Disclosure in Centralized Key Management Schemes;214
10.2;8.2 Defense Techniques;223
10.3;8.3 Optimization;228
10.4;8.4 Simulations;231
10.5;8.5 GDI Disclosure and Protection in Contributory Key Management Schemes;233
10.6;8.6 Chapter Summary;238
11;Reducing Delay and Enhancing DoS Resistance in Multicast Authentication;240
11.1;9.1 Background Literature and TESLA;241
11.2;9.2 Staggered TESLA: Multi-Grade Multicast Authentication;245
11.3;9.3 Reduced-Delay Multicast Authentication Schemes;252
11.4;9.4 Buffer Requirements and Tradeoffs;255
11.5;9.5 Simulations and Performance Analysis;260
11.6;9.6 Conclusion;271
12;An Authentication Service for Sensor and Ad Hoc Networks;273
12.1;10.1 Introduction;273
12.2;10.2 TESLA and TESLA Certificates;276
12.3;10.3 Overview of the Authentication Framework;278
12.4;10.4 Certificates;280
12.5;10.5 Certificate Renewal;282
12.6;10.6 Entity Authentication;283
12.7;10.7 Roaming and Handoff;285
12.8;10.8 Data Origin Authentication;286
12.9;10.9 Evaluation;288
12.10;10.10 Conclusion;290
13;References;294
14;Index;308




