Secure Source Authentication Analysis for IP Multicast

来源 :华中科技大学 | 被引量 : 0次 | 上传用户:hefei666_y
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The remarkable growth of the Internet as a data transmission medium has in part been enabled by the simplicity and scalability of the core Internet Protocol (IP), which is used for addressing and routing data packets through the network. The IP service includes different model based on the application field in which it is implemented. IP multicast is undoubtedly an innovating area of IP services available today. IP Multicast capable network is increasingly becoming an important technology for commercial and even military distributive and group-based application. Multicast enables efficient group communication by allowing the sender to transmit a single copy of data, with network components such as routers and switches making copies as necessary for the receivers. In other hand, in spite of the vast amount of research and important raise of IP multicast protocols, the implementations of multicast applications have been slow. The major factor of this situation is that the multicast services lack support for traffic management, reliability and security. We identify IP multicast security as one of the key issues for the successful deployment of the group communication applications. In many ways, the IP multicast implementation and its security are then still at their infantile state. Put them together into Multicast Security, and we may have many original but interesting problems. The most challenging defy is the source authentication that presents a contradictory requirement on the computational and communication overhead. Thus mitigating solutions are necessary to resolve this problem. Those solutions presently used the amortization method to overcome the issue. But the annoyance in those solutions is that,for most of the existing methods the amortization of one side will imply higher overhead at the other side. This study is motivated by this trend and it investigates amortizations methods used in the source authentication of IP multicast by their conceptual architecture. We then proceed to an analytic investigation of the Information Dispersal Algorithm method utilized to come over the authentication overhead amortizations challenges, and propose some technical amelioration to it.
其他文献
二十世纪九十年代后,工作流技术成为计算机应用领域的一个研究热点.很多大学、研究机构和公司对工作流理论和产品进行了广泛的研究.该文以E3(E-Enterprise Environment)电子
随着全球定位系统(GPS)的广泛应用及GSM移动通信网建设的飞速发展,一种新型的通信服务业务一移动目标监控系统应运而生.该系统最大的特点是将GSM、GPS、GIS(地理信息系统)及
随着Internet技术的迅速发展和企业对信息化的不断要求,使得企业间或企业内部应用系统之间的信息交流和共享越来越频繁,因此对这些系统进行整合势在必行。消息代理中间件提供了
处于知识经济时代的企业,需要构建自己的以知识为中心的信息平台才能提高企业的经营效率和竞争力.本论文的目的就是要通过研究一个企业信息平台的安全控制策略,为企业构建满
"加密秘密信息并隐藏通信存在的事实"是如今保密通信的提出的较高要求,信息伪装技术是这个领域的十分活跃的研究方向之一.网络环境下,数字图像作为的主要媒体在信息伪装技术
IP网络电话由于其价格低廉、业务灵活等独特的优势,成为当今世界上发展最快的应用技术之一。SIP协议是为了解决IP电话网中现存的问题而开发出来的一种新型协议。uClinux是专为
随着计算机网络技术和通信技术的发展,因特网的接入方式和接入设备日趋多样化,用户需要根据运行环境和网络资源选择不同功能集的程序,以满足自己的特定需求。构件挖掘正是为了解
预测编码后的视频流对于网络传输差错非常敏感,网络传输中的一个小小的错误都有可能造成这种错误在时间和空间上的扩散,从而严重恶化视频质量。视频差错控制技术的实质就在于无
以计量学为基础的新一代几何产品技术规范(New-generation Geometrical Product Specifications,N-GPS)标准体系为几何产品提供了在国际经济运作的大环境中的唯一可靠的交流和评
随着Internet上信息量爆炸式地增长,网络环境的日益复杂,出现了“信息爆炸但信息贫乏”的现象。面对浩瀚的信息,用户却无法得到对自己真正有价值的知识。如何从分布的海量数