Spelling suggestions: "subject:"multicast communication"" "subject:"muilticast communication""
1 |
Multi-Service Group Key Management for High Speed Wireless Mobile Multicast NetworksMapoka, Trust T., Shepherd, Simon J., Dama, Yousef A.S., Al Sabbagh, H.M., Abd-Alhameed, Raed 17 July 2015 (has links)
Yes / Recently there is a high demand from the Internet Service Providers to transmit multimedia services over high speed wireless networks. These networks are characterized by high mobility receivers which perform frequent handoffs across homogenous and heterogeneous access networks while maintaining seamless connectivity to the multimedia services. In order to ensure secure delivery of multimedia services to legitimate group members, the conventional cluster based group key management (GKM) schemes for securing group communication over wireless mobile multicast networks have been proposed. However, they lack efficiency in rekeying the group key in the presence of high mobility users which concurrently subscribe to multiple multicast services that co-exist in the same network. This paper proposes an efficient multi-service group key management scheme (SMGKM) suitable for high mobility users which perform frequent handoffs while participating seamlessly in multiple multicast services. The users are expected to drop subscriptions after multiple cluster visits hence inducing huge key management overhead due to rekeying the previously visited cluster keys. The already proposed multi-service SMGKM system with completely decentralised authentication and key management functions is adopted to meet the demands for high mobility environment with the same level of security. Through comparisons with existing GKM schemes and simulations, SMGKM shows resource economy in terms of reduced communication and less storage overheads in a high speed environment with multiple visits.
|
2 |
A multi-service cluster-based decentralized group key management scheme for high mobility usersMapoka, Trust T., AlSabbagh, Haider M., Dama, Yousef A.S., Shepherd, Simon J., Abd-Alhameed, Raed, Bin-Melha, Mohammed S., Anoh, Kelvin O.O. January 2015 (has links)
No / Previous cluster based group key management schemes for wireless mobile multicast communication lack efficiency in rekeying the group key if high mobility users concurrently subscribe to multiple multicast services that co-exist in the same network. This paper proposes an efficient multi-service group key management scheme suitable for high mobility users which perform frequent handoffs while participating seamlessly in multiple multicast services. The users are expected to drop subscriptions after multiple cluster visits hence inducing huge key management overhead due to rekeying the previously visited cluster keys. However we adopt our already proposed SMGKM system with completely decentralised authentication and key management functions to address demands for high mobility environment with same level of security and less overhead. Through comparisons with existing schemes and simulations, SMGKM shows resource economy in terms of rekeying communication overhead in high mobility environment with multi-leaves.
|
3 |
Security and Efficiency Tradeoffs in Multicast Group Key ManagementDuma, Claudiu January 2003 (has links)
<p>An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue.</p><p>In this thesis we study the efficiency versus security requirements tradeoffs in group key management for multicast communication. The efficiency is in terms of minimizing the group rekeying cost and the key storage cost, while security is in terms of achieving backward secrecy, forward secrecy, and resistance to collusion.</p><p>We propose two new group key management schemes that balance the efficiency versus resistance to collusion. The first scheme is a flexible category-based scheme, and addresses applications where a user categorization can be done based on the user accessibility to the multicast channel. As shown by the evaluation, this scheme has a low rekeying cost and a low key storage cost for the controller, but, in certain cases, it requires a high key storage cost for the users. In an extension to the basic scheme we alleviate this latter problem.</p><p>For applications where the user categorization is not feasible, we devise a cluster-based group key management. In this scheme the resistance to collusion is measured by an integer parameter. The communication and the storage requirements for the controller depend on this parameter too, and they decrease as the resistance to collusion is relaxed. The results of the analytical evaluation show that our scheme allows a fine-tuning of security versus efficiency requirements at runtime, which is not possible with the previous group key management schemes.</p> / Report code: LiU-TEK-LIC-2003:53.
|
4 |
Efficient authenticated multi-service group key management for secure wireless mobile multicastMapoka, Trust T., Shepherd, Simon J., Abd-Alhameed, Raed, Anoh, Kelvin O.O. January 2014 (has links)
No
|
5 |
IP multicast receiver mobility support using PMIPv6 in a global satellite networkJaff, Esua K., Pillai, Prashant, Hu, Yim Fun 18 March 2015 (has links)
Yes / A new generation of satellite systems that support regenerative on-board processors (OBPs) and multiple spot beam technology have opened new and efficient possibilities of implementing IP multicast communication over satellites. These new features have widened the scope of satellite-based applications and also enable satellite operators to efficiently utilize their allocated bandwidth resources. This makes it possible to provide cost effective satellite network services. IP multicast is a network layer protocol designed for group communication to save bandwidth resources and reduce processing overhead on the source side. The inherent broadcast nature of satellites, their global coverage (air, land, and sea), and direct access to a large number of subscribers imply satellites have unrivalled advantages in supporting IP multicast applications. IP mobility support in general and IP mobile multicast support in particular on mobile satellite terminals like the ones mounted on long haul flights, maritime vessels, continental trains, etc., still remain big challenges that have received very little attention from the research community. This paper proposes how Proxy Mobile IPv6 (PMIPv6)-based IP multicast mobility support defined for terrestrial networks can be adopted and used to support IP mobile multicast in future satellite networks, taking cognizance of the trend in the evolution of satellite communications.
|
6 |
Security and Efficiency Tradeoffs in Multicast Group Key ManagementDuma, Claudiu January 2003 (has links)
An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. In this thesis we study the efficiency versus security requirements tradeoffs in group key management for multicast communication. The efficiency is in terms of minimizing the group rekeying cost and the key storage cost, while security is in terms of achieving backward secrecy, forward secrecy, and resistance to collusion. We propose two new group key management schemes that balance the efficiency versus resistance to collusion. The first scheme is a flexible category-based scheme, and addresses applications where a user categorization can be done based on the user accessibility to the multicast channel. As shown by the evaluation, this scheme has a low rekeying cost and a low key storage cost for the controller, but, in certain cases, it requires a high key storage cost for the users. In an extension to the basic scheme we alleviate this latter problem. For applications where the user categorization is not feasible, we devise a cluster-based group key management. In this scheme the resistance to collusion is measured by an integer parameter. The communication and the storage requirements for the controller depend on this parameter too, and they decrease as the resistance to collusion is relaxed. The results of the analytical evaluation show that our scheme allows a fine-tuning of security versus efficiency requirements at runtime, which is not possible with the previous group key management schemes. / <p>Report code: LiU-TEK-LIC-2003:53.</p>
|
7 |
Multicast Communication in Grid Computing Networks with Background TrafficKouvatsos, Demetres D., Mkwawa, I.M. January 2003 (has links)
No / Grid computing is a computational concept based on an infrastructure that integrates and collaborates the use of high end computers, networks, databases and scientific instruments owned and managed by several organisations. It involves large amounts of data and computing which require secure and reliable resource sharing across organisational domains. Despite its high computing performance orientation, communication delays between grid computing nodes is a big hurdle due to geographical separation in a realistic grid computing environment. Communication schemes such as broadcasting, multicasting and routing should, therefore, take communication delay into consideration. Such communication schemes in a grid computing environment pose a great challenge due to the arbitrary nature of its topology. In this context, a heuristic algorithm for multicast communication is proposed for grid computing networks with finite capacity and bursty background traffic. The scheme facilitates inter-node communication for grid computing networks and it is applicable to a single-port mode of message passing communication. The scheme utilises a queue-by-queue decomposition algorithm for arbitrary open queueing network models, based on the principle of maximum entropy, in conjunction with an information theoretic decomposition criterion and graph theoretic concepts. Evidence based on empirical studies indicates the suitability of the scheme for achieving an optimal multicast communication cost, subject to system decomposition constraints.
|
8 |
Improving authentication function in wireless mobile multicast communicationsMapoka, Trust T., Shepherd, Simon J., Anoh, Kelvin O.O., Abd-Alhameed, Raed, Dama, Yousef A.S., AlSabbagh, Haider M. January 2015 (has links)
No / In this paper a distributed authentication scheme based on independent session key per access network (HOISKA) is proposed for the decentralized multi-service group key management scheme in a wireless multicast environment. It enables a handover user Mi involved in multiple multicast service subscriptions to establish the long term credential from the trusted authentication server (As) during initial registration. The Mi then securely reuses the long term credential established to derive unique session keys per access network during handover across diverse access networks. The distributed nature HOISKA enables offloading the authentication function to the area network controllers (AKDs) such that As does not participate during handover authentication signalling. This simplifies handover by reducing handover exchange signalling constituting to less handover delays. Two scenarios for HOISKA, initial handover access (IAA) and Handover Access authentication (HAA) are presented then analyzed using the delay analytical model. The HOISKA model proves efficacy in both scenarios by inducing less transmission delays with comparable level of security compared to the widely deployed authentication scheme.
|
9 |
Multi-Service Group Key Establishment for Secure Wireless Mobile Multicast NetworksMapoka, Trust T., Dama, Yousef A.S., AlSabbagh, Haider M., Shepherd, Simon J., Abd-Alhameed, Raed 10 1900 (has links)
Yes / Recently there is high demand in distributing multimedia services over the internet to ubiquitous and computational intelligent mobile subscribers by the service providers (SPs). In this instance, provision of those services must be restricted to authorized subscribers via integration of authentication and group key management (GKM). GKM with diverse group services subscribed dynamically by moving subscribers in wireless networks has been omitted in conventional approaches. However it is expected that significant key management overhead will arise in them due to multi-services co-existing in the same network. In this paper, we propose a scalable decentralized multi-service GKM scheme considering host mobility in wireless environment. In the scheme, authentication of mobile subscribers and key management phases are delegated from the trusted domain key distributor (DKD) to the subgroup controllers known as area key distributors (AKD). The trusted intermediate AKDs can then establish and distribute the service group keys to valid subscribers in a distributed manner using identity-based encryption without involving the domain key distributor (DKD). This alleviates unnecessary delays and possible bottlenecks at the DKD. We show by simulation that the proposed scheme has some unique scalability properties over known schemes in terms of optimized rekeying communication and storage overheads. The security performance studies have shown resilience to various attacks.
|
10 |
Réseaux de multidiffusion avec coopération interactive entre récepteurs / Multicast networks with interactive receiver cooperationExposito, Victor 07 February 2018 (has links)
La présente thèse s’intéresse aux communications descendantes, plus spécifiquement aux canaux de multidiffusion, pour lesquels un émetteur diffuse un message commun destiné à tous les utilisateurs d’un groupe. Pour que le débit ne soit pas limité par le plus faible utilisateur en terme de qualité de canal, différentes solutions reposant sur des techniques entrées multiples sorties multiples massives ou multi-débit ont été proposées dans la littérature. Cependant, si tous les utilisateurs souhaitaient obtenir le même niveau de qualité, le plus faible utilisateur établirait le débit et/ou nécessiterait une quantité de ressources démesurée, ce qui impacterait tout le groupe. Les études récentes portant sur les communications d’appareil à appareil ouvrent la voie à la coopération entre utilisateurs proches, ce qui pourrait bénéficier à tous les utilisateurs, en garantissant le même niveau de qualité tout en maintenant un faible coût en ressource et en énergie. C’est pour ces raisons que cette thèse s’intéresse aux canaux de multidiffusion avec coopération entre récepteurs. La théorie de l’information formalise l’étude de ces réseaux et fournit des bornes universelles portant sur le débit transmissible. Le schéma de coopération proposé se base sur une superposition appropriée d’opérations de compresse-relaie (CF) et décode-relaie (DF), et il est prouvé que ses performances surpasse celles des schémas de coopérations non-interactifs pour le scénario à deux récepteurs. Les propriétés de la coopération interactive émergent de l’asymétrie de construction du schéma de coopération, ce qui permet d’adapter l’ordre des CFs et DFs en fonction de la qualité du canal. L’idée derrière cette interaction, les intuitions concernant les points clés de la construction, et des résultats numériques sont donnés pour des réseaux de petites tailles. Des simulations au niveau du système illustrent le gain potentiel que la coopération entre récepteurs pourrait apporter pour des réseaux de plus grandes tailles. / The present thesis concentrates on downlink communications. In order to tackle one part of this challenging problem, we focus on the multicast channel in which one transmitter broadcasts a common message intended to a whole group of users. To ensure that the transmission rate is not limited by the weakest user in terms of channel quality, different solutions using massive multiple-input multiple-output or multirate strategies have been proposed in the literature. However, if all users wish to obtain the same content quality, the weakest user would set the rate and/or require a disproportionate amount of resource, and thus impact the whole group. With the recent study of device-to-device mechanisms, user cooperation in close proximity becomes possible and would benefit to all users by ensuring the same content quality while maintaining a low cost in terms of amount of resource and energy. Consequently, this thesis is centered around the multicast network with receiver cooperation. Information-theoretic tools formalize the study of the network considered and provide general bounds on the achievable transmission rate. The proposed cooperation scheme is based on an appropriate superposition of compress-forward (CF) and decode-forward (DF) operations, and provenly outperform non-interactive schemes in the two-receiver scenario. Properties of the interactive cooperation emerge from the asymmetric construction of the scheme which permits to adapt the order of CFs and DFs according to the channel condition. The core idea of the interaction, some insights on key construction points, and numerical results are given for small size networks. System level simulations illustrate the potential gain of receiver cooperation for larger networks.
|
Page generated in 0.1301 seconds