{"title":"安全组播通信的密钥管理综述","authors":"Youssef Baddi, M. D. Ech-Cherif El Kettani","doi":"10.1109/JNS3.2013.6595453","DOIUrl":null,"url":null,"abstract":"Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Key management for secure multicast communication: A survey\",\"authors\":\"Youssef Baddi, M. D. Ech-Cherif El Kettani\",\"doi\":\"10.1109/JNS3.2013.6595453\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.\",\"PeriodicalId\":157229,\"journal\":{\"name\":\"2013 National Security Days (JNS3)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 National Security Days (JNS3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JNS3.2013.6595453\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key management for secure multicast communication: A survey
Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.