期刊文献+

基于PIM-DM批量密钥更新仿真研究

Simulation Research Based on PIM-DM Batch Rekeying
在线阅读 下载PDF
导出
摘要 批量密钥更新可以有效解决实时密钥更新所产生的低效和失序等问题。讨论了批量密钥更新管理中密钥分发问题,着重分析了密集模式协议(PIM-DM)实现方法,并针对密集模式协议,添加了批量密钥更新管理模型,对树型结构的密钥管理,利用NS仿真软件中的多播协议进行了仿真。结果表明提高了密钥更新效率,增强了该协议的安全性。 Batch rekeying can efficiently resolve the problems, such as inefficiency and out - of - sync, produced by individual rekeying. Mainly discusses the group key distribution in batch rekeying management,analyzes emphatically the realization of the multicast protocol, especially the PIM- DM protocol, and directed at the PIM - DM protocol, develops a model of batch rekeying management. Makes use of multicast protocol in software NS to conduct simulation study on key management of key tree mechanism. As a result, it has improved the group rekeying efficiency and the security of this protocol is enhanced.
出处 《计算机技术与发展》 2007年第9期160-162,170,共4页 Computer Technology and Development
基金 安徽省高校自然科学基金重点资助项目(2005KJ009ZD)
关键词 多播安全 批量更新 网络仿真 multicast security batch rekeying network simulation
  • 相关文献

参考文献6

  • 1许勇,凌龙,顾冠群.可靠可缩放安全多播密钥更新实现研究[J].计算机研究与发展,2004,41(6):934-939. 被引量:6
  • 2Li X S,Yang Y R,Gouda M G,et al.Batch rekeying for secure group communications[C]//The 10th Int'l World Wide Web Conference.Hong Kong:[s.n.],2001.
  • 3Adams A,Nicholas J,Siadak W.Protocol Independent Multicast-Dense Mode (PIM-DM):Protocol Specification (Revised)[S].IETF,RFC3973,2005.
  • 4Greis M.Tutorial for the Network Simulator ns[EB/OL].2000.http://www.isi.edu/nsnam/ns/tutorial/index.html.
  • 5Fall K,Varadhan K.The ns Manual (formerly ns Notes and Documentation)[EB/OL].2003.http://www.isi.edu/nsnam/ns/ns-documentation.html.
  • 6Alrman E,Jimenez T.NS Simulator for beginners[J].Lecture notes,2003,12:29-31.

二级参考文献8

  • 1C K Wong, M Gouda, S S Lam. Secure group communications using key graphs. IEEE/ACM Trans on Networking, 2000, 8(1): 16~30
  • 2D Wallner, E Harder, R Agee. Key management for multicast:Issues and architectures. IETF Internet draft, 1998
  • 3X SLi, YR Yang, M GGouda, etal. Batch rekeying for secure group communications. The 10th Int'l World Wide Web Conference, HongKong, 2001
  • 4Y R Yang, X S Li, X B Zhang, et al. Reliable group rekeying: A performance analysis. ACM SIGCOMM 2001, San Diego, CA,USA, 2001
  • 5S Setia, S Zhu, S Jajodia. A scalable and reliable key distribution protocol for multicast group rekeying. George Mason University,Tech Rep: 02.02.pdf, 2002
  • 6S Setia, S Koussih, S Jajodia, et al. Kronos: A scalable group rekeying approach for secure multicast. IEEE Symp on Security and Privacy. Berkeley, CA, 2000
  • 7I Chang, R Engel, D Kandlur, et al. Key management for secure Internet multicast using Boolean function minimization techniques.IEEE Infocomm 1999, New York, 1999
  • 8N Waldvogel, G Caronni, D Sun, et al. The versaKey framework: Versatile group key management. IEEE J Select Areas Comm, 1999, 17(9): 1614~1631

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部