Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Network-Aware Security for Group Communications / Edition 1

Network-Aware Security for Group Communications / Edition 1

by Yan Sun, Wade Trappe, K. J. Ray Liu

See All Formats & Editions

ISBN-10: 0387688463

ISBN-13: 9780387688466

Pub. Date: 10/09/2007

Publisher: Springer US

Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes the state-of-the-art in securing group communications in emerging networks and for future applications. The growth of multi-user services makes it essential that a complementary suite of security solutions are deployed in order to protect these


Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes the state-of-the-art in securing group communications in emerging networks and for future applications. The growth of multi-user services makes it essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications. This book is focused on tailoring security solutions to the underlying network architecture (such as the wireless cellular network, or ad hoc and sensor networks), or to targeted applications using methods tailored for that application (such as multimedia multicasts). The authors focus the discussion on two fundamental security issues for group communications: providing efficient key management for providing confidentiality, and providing authentication for group services.

Product Details

Springer US
Publication date:
Edition description:
Product dimensions:
6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Preface     vii
Introduction     1
Book Overview     3
Centralized Multi-user Key Management     7
Basic Multicast Information Theory     7
Overview of Multicast Key Management     11
Requirements for Centralized Group Key Management     13
Basic Polynomial Interpolation Scheme     15
Resistance to Attack     17
Anonymity Reduces Communication Overhead     18
Extending to a Scalable Protocol     19
Basic Protocol Primitives     21
Advanced Protocol Operations     23
Architectural Considerations     26
Optimization of Tree Degree for Communication     26
Binomial Occupancy Model     30
Communication Overhead     32
Computational Complexity     35
Chapter Summary     36
Group Key Agreement Techniques in Heterogeneous Networks     39
Introduction     39
Group DH Overview     41
Conference Trees and the Butterfly Scheme     43
Computational Considerations     49
Minimizing Total Cost     49
Budget Constraints     51
Combined Budget and Cost Optimization     54
Efficiency and Feasibility Evaluation     56
Comparison of Total Cost     56
Feasibility Comparison     58
System Sensitivity to False Costs     62
Sensitivity to Approximate Costs     62
Sensitivity to Costs from Untrusty Users     64
Chapter Summary     68
Optimizing Rekeying Costs in Group Key Agreement     71
Join-Exit Tree for Reducing Latency in Key Agreement Protocols     72
Time-efficiency Measurement     72
Join-Exit Tree (JET) Topology     73
The Join Tree Algorithm     74
The Exit Tree Algorithm     80
Performance Analysis     83
Optimizing Rekeying Cost     85
Performance Metric Review     85
PFMH Key Tree Structure and Basic Procedures     87
PACK: an PFMH tree-based contributory group key agreement     97
Performance Evaluation and Comparison     107
Contributory Group Key Agreement with Key Validation     109
Chapter Summary     110
Optimizing Multicast Key Management for Cellular Multicasting     113
Targeting Property of Rekeying Messages     114
Topology-aware Key Management     115
Topology-aware Key Management in Cellular Wireless Network     115
Key Tree Design     116
Performance Metrics     117
Handoff Schemes for TMKM Tree     118
Performance Analysis     122
Separability of the Optimization Problem     126
Optimizing TMKM Tree Design     127
Dynamic membership model     128
ALX tree structure     129
User subtree design     132
BS subtree design     133
SH subtree design     134
Performance Evaluation     136
One-SH systems     136
SH subtree design methods     139
Multiple-SH systems     140
Chapter Summary     142
Key Management and Distribution for Securing Multimedia Multicasts     143
A Basic Key Management Scheme     145
Key Refreshing     146
Member Join     147
Member Departure     147
Distribution of Rekeying Messages for Multimedia     148
Media-Independent Channel     150
Media-Dependent Channel     152
An Improved Rekeying Message Format     155
Basic Message Form     156
Security Analysis of Residue-based Method      157
Achieving Scalability     163
System Feasibility Study     166
Extensions to Multilayered Services     169
Chapter Summary     170
Hierarchical Access Control for Multi-Group Scenarios     175
Hierarchical Access Control: Problem Formulation     176
System description     176
Security requirements     177
Data encryption and hierarchical key management     178
Centralized Multi-group Key Management Scheme     179
Independent key trees for hierarchical access control     179
Multi-group key management scheme     179
Performance Measures and Analysis     184
Storage overhead     185
Rekey overhead     188
Simulations and Performance Comparison     189
Statistical dynamic membership model     189
Performance with different group size     191
Scalability     192
Performance with different transition probability     192
Simulation of multi-service applications     196
Contributory Multi-group Key Management     196
Related Work     199
Chapter Summary     200
Protecting Membership Information in Secure Multicasting      203
GDI Disclosure in Centralized Key Management Schemes     204
Attack 1: Estimation of J(t[subscript 0], t[subscript 1]) and L(t[subscript 0], t[subscript 1]) from rekeying-message format     205
Attack 2: Estimation of the group size from the rekeying-message-size     206
Attack 3: Estimation of group size based on key IDs     208
Discussion on three attacks     211
GDI vulnerability in prevalent key management schemes     212
Defense Techniques     213
Optimization     218
The leakage of GDI     218
Communication Overhead     220
System Optimization     221
Simulations     221
GDI Disclosure and Protection in Contributory Key Management Schemes     223
Fully and Partially Contributory Key Management Schemes     226
GDI Disclosure in Contributory Key Management Schemes     227
The Cost of Preventing GDI leakage     227
More on GDI Leakage Problem     228
Chapter Summary     228
Reducing Delay and Enhancing DoS Resistance in Multicast Authentication     231
Background Literature and TESLA     232
Related Work     232
TESLA Overview     234
Examination of Trust in TESLA      235
Staggered TESLA: Multi-Grade Multicast Authentication     236
Format of the Packet     237
Multi-Grade Source Authentication     238
Reduced-Delay Multicast Authentication Schemes     243
Staggered TESLA with Proximity Protection     243
Distributed Key Distributors     245
Buffer Requirements and Tradeoffs     246
Simulations and Performance Analysis     251
Simulations on Multi-Grade Authentication     251
Performance Analysis of Staggered TESLA     252
Impact of the Locations of Adversaries     255
Simulation on Reducing Authentication Delay     260
Conclusion     262
An Authentication Service for Sensor and Ad Hoc Networks     265
Introduction     265
Hierarchical Sensor Network     266
TESLA and TESLA Certificates     268
TESLA Certs     269
Overview of the Authentication Framework     270
Certificates     272
Initial Certs     272
Runtime Certs     273
Certificate Renewal     274
Access Point     274
Sensor Node     274
Entity Authentication      275
Access Point     275
Forwarding Nodes     275
Sensor Nodes     276
Roaming and Handoff     277
Forwarding Nodes     277
Sensor Nodes     277
Data Origin Authentication     278
Sending Sensor Data in Weak Mode     278
Sending Sensor Data in Assured Mode     279
Evaluation     280
Security Analysis     280
Performance Analysis     281
Conclusion     282
References     287
Index     301

Customer Reviews

Average Review:

Post to your social network


Most Helpful Customer Reviews

See all customer reviews