A novel secure multicast scheme in mobile Internet

Guo-jun Wang , Lin Liao , Jian-nong Cao , Keith C. C. Chan

Journal of Central South University ›› 2005, Vol. 12 ›› Issue (6) : 720 -725.

PDF
Journal of Central South University ›› 2005, Vol. 12 ›› Issue (6) : 720 -725. DOI: 10.1007/s11771-005-0076-z
Article

A novel secure multicast scheme in mobile Internet

Author information +
History +
PDF

Abstract

A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s.

Keywords

key management / access control / related factor / local group / changing residue

Cite this article

Download citation ▾
Guo-jun Wang, Lin Liao, Jian-nong Cao, Keith C. C. Chan. A novel secure multicast scheme in mobile Internet. Journal of Central South University, 2005, 12(6): 720-725 DOI:10.1007/s11771-005-0076-z

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

AklS G, TaylorP D. Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Trans Computer Systems, 1983, 1(3): 239-248

[2]

LinC H. Dynamic key management scheme for access control in a hierarchy[J]. Computer Communications, 1997, 20(15): 1381-1385

[3]

TzengW G. A time-bound cryptographic key assignment scheme for access control in a hierarchy [J]. IEEE Trans on Knowledge and Data Engineering, 2002, 14(1): 182-188

[4]

ChangC C, HwangR J. Cryptographic key assignment scheme for access control in a hierarchy[J]. Information Systems, 1992, 17(3): 243-247

[5]

LinC H, ChangC, LeeR C. A new public-key cipher system based upon the Diophantine equations [J]. IEEE Trans on Computers, 1995, 44(1): 13-19

[6]

ChangC C, LinC H, LeeW, et al.. Secret sharing with access structures in a hierarchy[A]. Proc 18th International Conference on Advanced Information Networking and Application (AINA’04) [C], 2004, Kyushu, IEEE Computer Society: 31-34

[7]

LuW W. Compact multidimensional broadband wireless: the convergence of wireless mobile and access [J]. IEEE Communications Magazine, 2000, 38(11): 119-123

[8]

OtsuT, UmedaN, YamaoY. System architecture for mobile communication systems beyond IMT-2000[A]. Proc 44th IEEE Global Telecommunications Conference[C], 2001, San Antonio, IEEE Communications Society: 538-542

[9]

ZahariadisT B, VaxevanakisK G, TsantilasC P, et al.. Global roaming in next-generation networks[J]. IEEE Communications Magazine, 2002, 40(2): 145-151

[10]

MorandL, TessierS. Global mobility approach with mobile IP in all IP networks[A]. Proc 2002 IEEE International Conference on Communications[C], 2002, New York, IEEE Communications Society: 2075-2079

[11]

WangG, CaoJ, ChanK C C. A reliable totally-ordered group multicast protocol for mobile Internet [A]. Proc IEEE 33rd International Conference on Parallel Processing Workshops (ICPPW 2004) [C], 2004, Montreal, IEEE Computer Society: 108-115

[12]

MittraS. Iolus: a framework for scalable secure multicasting[J]. ACM SIGCOMM Computer Communication Review, 1997, 27(4): 227-288

[13]

TanK J, ZhuH W. A conference key distribution scheme based on the theory of quadratic residues[J]. Computer Communications, 1999, 22(8): 735-738

[14]

ChouJ S, LinC H, LeeT Y. A novel hierarchical key management scheme based on quadratic residues [A]. Proc 2nd International Symposium on Parallel and Distributed Processing and Applications [C], 2004, Hong Kong, Springer-Verlag: 858-865

[15]

LeeN, HwangT. Comments on dynamic key management schemes for access control in a hierarchy[J]. Computer Communications, 1999, 22(1): 87-89

AI Summary AI Mindmap
PDF

124

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/