hip-multicast model realizes to manage the group members by introducing the multicast agent (MA). However it does not give a data key distribution protocol in which the key is used to encrypt and decrypt multicast dat...
详细信息
hip-multicast model realizes to manage the group members by introducing the multicast agent (MA). However it does not give a data key distribution protocol in which the key is used to encrypt and decrypt multicast data. In this paper, a data key distribution protocol applied to hip-multicast model is proposed according to the characters of the model. The proposed protocol adds a multicast key center (MKC) to the model to distribute the data key. It can securely distribute the data key and avoid several possible attacks. The proposed protocol can also improve the practicability and security of hip-multicast model and does not increase too much complexity for the model. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th...
详细信息
ISBN:
(纸本)9781424406661
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on the use of an extended version of the Host Identity Protocol. The applicability of the model is demonstrated for peer-to-peer multicasting and for non-shared media access networks. A formal validation of a two-layer peer-to-peer network based on this architecture has been completed.
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th...
详细信息
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on the use of an extended version of the Host Identity Protocol. The applicability of the model is demonstrated for peer-to-peer multicasting and for non-shared media access networks. A formal validation of a two-layer peer-to-peer network based on this architecture has been completed.
暂无评论