Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Network-Aware Security for Group Communications (eBook)

eBook Download: PDF
2007 | 2008
XVIII, 304 Seiten
Springer US (Verlag)
978-0-387-68848-0 (ISBN)

Lese- und Medienproben

Network-Aware Security for Group Communications - Yan Sun, Wade Trappe, K. J. Ray Liu
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).


Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications.This book aims to fill a growing need in the research community for a reference that describes the state of the art in securing group communications. Network-Aware Security for Group Communications focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).

Preface 6
Contents 11
Introduction 16
1.1 Book Overview 18
Centralized Multi-user Key Management 22
2.1 Basic Multicast Information Theory 22
2.2 Overview of Multicast Key Management 26
2.3 Requirements for Centralized Group Key Management 28
2.4 Basic Polynomial Interpolation Scheme 30
2.5 Extending to a Scalable Protocol 34
2.6 Architectural Considerations 41
2.7 Chapter Summary 51
Group Key Agreement Techniques in Heterogeneous Networks 53
3.1 Introduction 53
3.2 Group DH Overview 55
3.3 Conference Trees and the Butterfly Scheme 57
3.4 Computational Considerations 63
3.5 Efficiency and Feasibility Evaluation 70
3.6 System Sensitivity to False Costs 76
3.7 Chapter Summary 82
Optimizing Rekeying Costs in Group Key Agreement 84
4.1 Join-Exit Tree for Reducing Latency in Key Agreement Protocols 85
4.2 Optimizing Rekeying Cost 98
4.3 Chapter Summary 123
Optimizing Multicast Key Management for Cellular Multicasting 125
5.1 Targeting Property of Rekeying Messages 126
5.2 Topology-aware Key Management 127
5.3 Topology-aware Key Management in Cellular Wireless Network 127
5.4 Performance Analysis 134
5.5 Separability of the Optimization Problem 138
5.6 Optimizing TMKM Tree Design 139
5.7 Performance Evaluation 148
5.8 Chapter Summary 154
Key Management and Distribution for Securing Multimedia Multicasts 155
6.1 A Basic Key Management Scheme 157
6.2 Distribution of Rekeying Messages for Multimedia 160
6.3 An Improved Rekeying Message Format 167
6.4 System Feasibility Study 178
6.5 Extensions to Multilayered Services 181
6.6 Chapter Summary 182
Hierarchical Access Control for Multi- Group Scenarios 186
7.1 Hierarchical Access Control: Problem Formulation 187
7.2 Centralized Multi-group Key Management Scheme 190
7.3 Performance Measures and Analysis 195
7.4 Simulations and Performance Comparison 200
7.5 Contributory Multi-group Key Management 207
7.6 Related Work 210
7.7 Chapter Summary 211
Protecting Membership Information in Secure Multicasting 213
8.1 GDI Disclosure in Centralized Key Management Schemes 214
8.2 Defense Techniques 223
8.3 Optimization 228
8.4 Simulations 231
8.5 GDI Disclosure and Protection in Contributory Key Management Schemes 233
8.6 Chapter Summary 238
Reducing Delay and Enhancing DoS Resistance in Multicast Authentication 240
9.1 Background Literature and TESLA 241
9.2 Staggered TESLA: Multi-Grade Multicast Authentication 245
9.3 Reduced-Delay Multicast Authentication Schemes 252
9.4 Buffer Requirements and Tradeoffs 255
9.5 Simulations and Performance Analysis 260
9.6 Conclusion 271
An Authentication Service for Sensor and Ad Hoc Networks 273
10.1 Introduction 273
10.2 TESLA and TESLA Certificates 276
10.3 Overview of the Authentication Framework 278
10.4 Certificates 280
10.5 Certificate Renewal 282
10.6 Entity Authentication 283
10.7 Roaming and Handoff 285
10.8 Data Origin Authentication 286
10.9 Evaluation 288
10.10 Conclusion 290
References 294
Index 308

Erscheint lt. Verlag 17.10.2007
Zusatzinfo XVIII, 304 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte ACCESS • Access Control • Architecture • authentication • broadcast • Communication • denial of service • Information • Multimedia • security
ISBN-10 0-387-68848-X / 038768848X
ISBN-13 978-0-387-68848-0 / 9780387688480
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95