Adding confidentiality to application-level multicast by leveraging the multicast overlay


Abstract:

While scalability, routing and performance are core issues for Application-Level Multicast (ALM) protocols, an important but less studied problem is security. In particular, confidentiality (i.e. data secrecy, achieved through data encryption) in ALM protocols is needed. Key management schemes must be simple, scalable, and must not degrade the performance of the ALM protocol. We explore three key management schemes that leverage the underlying overlay to distribute the key(s) and secure ALM. We evaluate their impact on three well-known ALM protocols: ESM, ALMI and NICE. Through analysis and simulations, we show that utilizing the ALM overlay to distribute key(s) is feasible. For a given ALM protocol, choice of the best key management scheme depends on the application needs: minimizing rekeying latency or minimizing data multicasting latency.

Año de publicación:

2005

Keywords:

    Fuente:

    scopusscopus
    googlegoogle

    Tipo de documento:

    Conference Object

    Estado:

    Acceso restringido

    Áreas de conocimiento:

    • Red informática
    • Ciencias de la computación

    Áreas temáticas de Dewey:

    • Ciencias de la computación
    Procesado con IAProcesado con IA

    Objetivos de Desarrollo Sostenible:

    • ODS 9: Industria, innovación e infraestructura
    • ODS 16: Paz, justicia e instituciones sólidas
    • ODS 17: Alianzas para lograr los objetivos
    Procesado con IAProcesado con IA