Source Specific Centralized Secure Multicast Scheme based on IPSec

被引:0
|
作者
Shaheen, Safdar Hussain [1 ]
Yousaf, Muhammad [1 ]
机构
[1] Riphah Int Univ, Islamabad, Pakistan
关键词
Authentication; Group Key Management; IKEv2; IPSec; Multicast;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group-oriented applications require multicast communication for distributing information among the group members efficiently. The deployment of such kind of applications in strategic and military grade organizations needs the secure group-oriented mechanism. The key concerns involved in secure multicast communication are "forward and backward security", "source/recipient identification and authentication", "key revocation" and "secure rekeying". This paper proposes a source specific centralized secure multicast scheme based on IPSec infrastructure by addressing these security challenges. The key management, in proposed secure multicast scheme, has been carried out using the Group Internet Key Exchange (G-IKE v2) version 2 protocol.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 50 条
  • [31] An Efficient Key Agreement Scheme for Dynamic Secure Multicast
    Chen Li-qing
    Yang Song
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 492 - 496
  • [32] Research of Source Mobility of Source Specific Multicast
    Lai, Yingxu
    Liu, Zenghui
    Qin, Hua
    Ma, Jianghua
    Bu, Shupo
    PRACTICAL APPLICATIONS OF INTELLIGENT SYSTEMS, 2011, 124 : 53 - +
  • [33] Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
    Prakash, A. John
    Uthariaraj, V. Rhymend
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 246 - 253
  • [34] Efficient Key Management Scheme for Secure Multicast in MANET
    Lakshmanaperumal, J.
    Thanushkodi, K.
    Kumar, N. M. Saravana
    Saravanan, K.
    Vigneshwaran, D.
    Purusothaman, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 157 - 164
  • [35] An efficient key management scheme for secure wireless multicast
    Sun, Y
    Trappe, W
    Liu, KJR
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1236 - 1240
  • [37] A source authentication scheme based on message recovery digital signature for multicast
    Yang, Jen-Ho
    Lin, Iuon-Chang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2616 - 2627
  • [38] LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
    Di Pietro, R
    Mancini, LV
    Law, YW
    Etalle, S
    Havinga, P
    2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, : 397 - 406
  • [39] Individually-Secure Multi-Source Multicast
    Cohen, Alejandro
    Cohen, Asaf
    Medard, Muriel
    Gurewitz, Omer
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017,
  • [40] Dynamic Security Scheme for Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 515 - 521