(3.220.231.235) 您好!臺灣時間:2021/03/08 06:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:范凱威
研究生(外文):Kai-Wei Fan
論文名稱:在MBone網路上具擴充性的安全群組通訊協定
論文名稱(外文):A Scalable and Secure Multicast Protocol on MBone Network
指導教授:謝續平謝續平引用關係
指導教授(外文):Shiuh-Pyng Shieh
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊工程系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:1999
畢業學年度:87
語文別:英文
論文頁數:50
中文關鍵詞:安全群組通訊協定群組廣播
外文關鍵詞:MBoneMulticastSecuritySecure Multicast
相關次數:
  • 被引用被引用:0
  • 點閱點閱:104
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
目前許多學者、研究人員都致力於設計適用於群組通訊環境的安全通訊協定或群組金鑰的管理架構,以期能建立安全、隱密、有效率的群組通訊環境。但是,目前所設計的群組通訊協定或金鑰管理架構並沒有考慮到實際的網路架構,且其擴充性與運作效率均不高,因此,這些安全機制並不適用於多址傳輸骨幹網路 (MBone) 上。在這篇論文中,我們提出一套分散式的金鑰管理、發送機制,並設計一套安全多址傳輸協定,使其不但符合多址傳輸網路骨幹的底層架構,且更具高擴充性及高效率。在本論文所提出的安全多址協定中,我們利用多址傳輸網路骨幹上具有多個區域網路組合元件的特性,將整個通訊群組區分成數個較小的區域群組,並將每個區域網路當成一個通訊的基本單位。利用這種網路的組成特性,將群組金鑰的發送、更新等程序限制在區域群組內。當某區域網路的使用者加入或離開通訊群組時,只有該區域群組的使用者須更新區域群組的金鑰,其他區域群組的使用者完全不須做任何的動作。這種特性將使我們設計的安全群組通訊協定變得更有效率,且具有良好的擴充性。我們同時考量不同型態的群組通訊環境有其不同的運作方式,將這個安全通訊協定區分成兩種運作模式,使其在各種環境下都具有最佳的運作效率。

Despite many protocols designed for secure group communication have been proposed, they are impractical to use on Muticast Backbone (MBone). This is mainly for two reasons. First, the physical network architecture is not considered in their protocols. Second, these protocols are not scalable and efficient enough to use in MBone. In this thesis, we propose a secure and efficient multicast protocol where the key management and distribution mechanism is distributed. The proposed protocol takes advantage of the physical architecture of MBone while keeping the protocol scalable and efficient at the same time. By retaining the feature that multiple sub-networks construct MBone, hosts of a sub-network form a subgroup. All key distribution and key renewal procedures are restricted within a subgroup. When users of a subgroup join or leave a group, only members of that subgroup need to renew their subgroup key. Keys of other subgroups remain unchanged. To reach better performance, our protocol is divided into two modes which can easily adapt to different group communication environments.

Chapter 1 Introduction1
1.1 Background1
1.2 Contributions5
1.3 Synopsis6
Chapter 2 Related Work7
2.1 Internet Group Management Protocol (IGMP)7
2.2 Group Key Management and Distribution Protocol9
2.3 Summary13
Chapter 3 Scalable Secure Multicast Protocol15
3.1 Definitions15
3.2 Key Management16
3.2.1 Key Generation17
3.2.2 Message Encryption and Transmission18
3.2.3 Message Decryption20
3.3 Group Creation22
3.4 Join22
3.4.1 MRouter Join23
3.4.2 User Join23
3.5 User Leave25
3.6 Summary26
Chapter 4 The Improved Secure Multicast Protocol27
4.1 Protocol Modes30
4.2 Shared Encryption Key Generation31
4.3 User Joins and Leaves34
4.4 Division between Stable and Unstable Modes35
4.5 Summary37
Chapter 5 Analysis39
5.1 Security Analysis39
5.2 Comparison41
Chapter 6 Conclusion45
Reference47

[Ballardie96]A. Ballardie, “Scalable Multicast Key Distribution,” Internet RFC 1949, May 1996.
[Ballardie95]A. J. Ballardie, “Core Based Trees (CBT) Multicast: Architectural Overview,” , June 20, 1995.
[Cain96]Brad Cain, Ajit Thyagarajan, and Steve Deering, “Internet Group Management Protocol, Version 3,” , Expires March 8, 1996.
[Burmester94]Burmester, M., and Desmedt, Y., “A Secure and Efficient Conference Key Distribution System,” Proceedings of EUROCRYPT '94, pp. 275 — 286, 1994.
[Deering89]Steve Deering, “Host Extensions for IP Multicasting,” Internet RFC 1112, August 1989.
[Deering95a]S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, and L. Wei, “Protocol-Independent Multicast (PIM): Motivation and Architecture,” , January 11, 1995.
[Deering95b]S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A Helmy, “Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification,” , September 7, 1995.
[Estrin96]D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A. Helmy, “Protocol-Independent Multicast (PIM), Dense-Mode Protocol Specification”, , January 17, 1996.
[Fenner96]William Fenner, “Internet Group Management Protocol, Version 2,” , Expires April 1996.
[Gong95]Li Gong and Nachum Shacham, “Trade-offs in Routing Private Multicast Traffic,” Global Telecommunications Conference, IEEE GLOBECOM '95, Volume: 3, Page(s): 2124 -2128, 1995.
[Hardjono98]Thomas Hardjono, Brad Cain, “Secure and Scalable Inter-Domain Group Key management for N-to-N Multicast,” Proceedings. 1998 International Conference on Parallel and Distributed Systems, Pages: 478 — 485, 1998.
[Harney97a]H. Harney, C. Muckenhirn, “Group Key Management Protocol (GKMP) Specification,” Internet RFC 2093, July 1997.
[Harney97b]H. Harney, C. Muckenhirn, “Group Key Management Protocol (GKMP) Architecture,” Internet RFC 2094, July 1997.
[Maufer97]Maufer, Tomas A., Deploying IP Multicast in the Enterprise, Prentice Hall, December 1997.
[Moy94]John Moy, “Multicast Extensions to OSPF,” Internet RFC 1584, March 1994.
[Nakamura90]H. Nakamura, K. Takagi, K. Okada, Y. Matsushita, “Hierarchical Group Oriented Key Management method HGK,” Proceedings of the Sixth Annual Computer Security Applications Conference on Pages: 44 — 49, 1990.
[Oppliger96a]R. Oppliger, and A. Albanese, “Distributed registration and key distribution (DiRK),” Proceedings of the 12th International Conference on Information Security (IFIP SEC '96), Island of Samos (Greece), Chapman & Hall, London, pp. 199 — 208, May 21 - 24, 1996.
[Oppliger96b]R. Oppliger, M. Bracher, and A. Albanese, “Distributed registration and key distribution for online universities,” Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS '96), Chapman & Hall, Essen (Germany), September 23 - 24, 1996.
[Oppliger96c]R. Oppliger, “Participants Registration, Validation, and Key Distribution for MBone Conferencing,” Swiss Computer Science Conference (SCSC '96), Zürich (Switzerland), October 22 - 23, 1996.
[Oppliger97]Rolf Oppliger, Andres Albanese, “Participant registration, validation, and key distribution for large-scale conferencing systems,” IEEE Communications Magazine, vol. 35, pp. -, June 1997.
[Perrig99]Adrian Perrig, “Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication,” Accepted by International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC ’99), 1999.
[Semeria]Chuck Semeria, Tom Maufer, “Introduction to IP Multicast Routing,” http://www.3com.com/nsc/501303s.html
[Sun98]Hung-Min Sun, Shiuh-Pyng Shieh, “Secure broadcasting in large networks,” Computer Communications, Vol: 21, Issue: 3, pp. 279-283, March 25, 1998.
[Waitzman88]D. Waitzman, C. Partridge, and S. Deering, “Distance Vector Multicast Routing Protocol,” Internet RFC 1075, November 1988.
[Wong98]Chung Kei Wong, Mohamed Gouda, Simon S. Lam, “Secure Group Communications Using Key Graphs,” Proceedings of ACM SIGCOMM’98, ACM, September, 1998.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔