Adding confidentiality to application-level multicast by leveraging the multicast overlay

被引:3
|
作者
Abad, C [1 ]
Gupta, I [1 ]
Yurcik, W [1 ]
机构
[1] Escuela Super Politecn Litoral, Fac Ing Elect & Computac, Guayaquil, Ecuador
来源
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS | 2005年
关键词
D O I
10.1109/ICDCSW.2005.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While scalability, routing and performance are core issues for Application-Level Multicast (ALM) protocols, an important but less, studied problem is security. In particular confidentiality (i.e. data secrecy, achieved through data encryption) in ALM protocols is needed. Key management schemes must be simple, scalable, and must not degrade the performance of the ALM protocol. We explore three key management schemes that leverage the underlying overlay to distribute the key(s) and secure ALM. We evaluate their impact on three well-known ALM protocols: ESM, ALMI and NICE. Through analysis and simulations, we show that utilizing the ALM overlay to distribute key(s) is feasible. For a given ALM protocol, choice of the best key management scheme depends on the application needs: minimizing rekeying latency or minimizing data multicasting latency.
引用
收藏
页码:5 / 11
页数:7
相关论文
共 50 条
  • [1] Island multicast: The combination of IP multicast with application-level multicast
    Cheuk, KWR
    Chan, SHG
    Lee, JYB
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1441 - 1445
  • [2] Construction of a robust multicast tree for application-level multicast
    Noguchi, T
    Yamamoto, M
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (12) : 4427 - 4434
  • [3] Construction of a robust multicast tree for application-level multicast
    Noguchi, T
    Yamamoto, M
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 130 - 135
  • [4] Voice over application-level multicast
    Blundell, Nick
    Egi, Norbert
    Mathy, Laurent
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 667 - +
  • [5] A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction
    Alkubeily, M.
    Bettahar, H.
    Bouabdallah, A.
    COMPUTER NETWORKS, 2011, 55 (15) : 3332 - 3350
  • [6] Serving dynamic groups in application-level multicast
    Jin, X
    Wong, WC
    Chan, SHG
    2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 432 - 436
  • [7] On robustness in application-level multicast: the case of HBM
    El-Sayed, A
    Roca, V
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1057 - 1062
  • [8] Lateral error recovery for application-level multicast
    Wong, KFS
    Chan, SHG
    Wong, WC
    Zhang, Q
    Zhu, WW
    Zhang, YQ
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2708 - 2718
  • [9] Programmer-Controlled Application-Level Multicast
    Dewan, Prasun
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 332 - 341
  • [10] Improving Delaunay Triangulation for application-level multicast
    Wong, WC
    Chan, SHG
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 2835 - 2839