Security measures in IP-multicasting - Classification and comparison

被引:0
作者
Grosch, C [1 ]
机构
[1] Fern Univ Hagen, Fachgebiet Kommunikationssyst, FTK, D-58084 Hagen, Germany
来源
CORE NETWORKS AND NETWORK MANAGEMENT NOC'99 | 1999年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The attractiveness of applications for multipoint communication increases with the expanding availability of conference partners in the Internet. Especially in the context of group communication for business applications the demand for security services becomes more and more important, because the information exchanged is usually much more sensitive than in private context. Therefore the demand for data and conference member authentication, privacy, and data integrity increases. It could be seen that, for different reasons, the new developments of multicasting techniques are mostly not considering security measures in an adequate way. This paper first summarizes the different kinds of applications which use multicasting or are expected to do so in future. They are classified by characteristics like group size, membership dynamic, and need for security services. Then a general survey of the most important proposals for providing security services and key management is given and the protocols are analyzed, focussing on the load for the group controller as the central key managing entity. The paper closes with a new proposal for protocol improvement for the general process of rekeying.
引用
收藏
页码:338 / 345
页数:8
相关论文
共 8 条
  • [1] BALLARDIE A, 1996, 1949 RFC
  • [2] DAI W, 1998, SPEED COMP POPULAR C
  • [3] HARDJONO T, 1998, FRAMEWORK GROUP KEY
  • [4] HARNEY H, 1997, 2094 RFC, P7
  • [5] LI G, 1994, IEEE P INT C NETW PR, P10
  • [6] Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
  • [7] MITTRAS S, 1997, P ACM C SPEC INT GRO, P9
  • [8] WALLNER DM, 1998, KEY MANAGEMENT MULTI