Source Specific Centralized Secure Multicast Scheme based on IPSec

被引:0
|
作者
Shaheen, Safdar Hussain [1 ]
Yousaf, Muhammad [1 ]
机构
[1] Riphah Int Univ, Islamabad, Pakistan
关键词
Authentication; Group Key Management; IKEv2; IPSec; Multicast;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group-oriented applications require multicast communication for distributing information among the group members efficiently. The deployment of such kind of applications in strategic and military grade organizations needs the secure group-oriented mechanism. The key concerns involved in secure multicast communication are "forward and backward security", "source/recipient identification and authentication", "key revocation" and "secure rekeying". This paper proposes a source specific centralized secure multicast scheme based on IPSec infrastructure by addressing these security challenges. The key management, in proposed secure multicast scheme, has been carried out using the Group Internet Key Exchange (G-IKE v2) version 2 protocol.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 50 条
  • [21] A novel secure multicast scheme in mobile Internet
    王国军
    廖麟
    曹建农
    CHAN Keith C.C.
    Journal of Central South University of Technology(English Edition), 2005, (06) : 720 - 725
  • [22] Secure Multicast Authentication Scheme using DTLS
    Woo, Si-Jae
    Kwak, Jin
    2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 133 - 137
  • [23] A scalable key distribution scheme for secure multicast
    Li, BH
    Hou, YB
    Zhao, YL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2532 - 2536
  • [24] Multicast Source Handover Scheme based on Proxy Router Discovery
    Takahashi, Takeshi
    Asatani, Koichi
    Tominaga, Hideyoshi
    2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 865 - 872
  • [25] A suite of algorithms for key distribution and authentication in centralized secure multicast environments
    Naranjo, J. A. M.
    Antequera, N.
    Casado, L. G.
    Lopez-Ramos, J. A.
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2012, 236 (12) : 3042 - 3051
  • [26] A scalable de-centralized multicast key management scheme
    Xu Yanyan
    Xu Zhengquan
    Chen Xi
    Yu Zhanwu
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 463 - +
  • [27] A Secure Mobile Healthcare System using Trust-Based Multicast Scheme
    Boukerche, Azzedine
    Ren, Yonglin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) : 387 - 399
  • [28] A dynamic core-based tree scheme for key management in secure multicast
    Xu, ZQ
    Chen, L
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 805 - 812
  • [29] EFFICIENT MULTICAST SOURCE ROUTING SCHEME
    CHEN, WT
    SHEU, PR
    CHANG, YR
    COMPUTER COMMUNICATIONS, 1993, 16 (10) : 662 - 666
  • [30] The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication
    Chen, Qiya
    Miao, Fuyou
    2022 8TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS, BIGCOM, 2022, : 128 - 133