Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. vii |
Introduction | p. 1 |
Book Overview | p. 3 |
Centralized Multi-user Key Management | p. 7 |
Basic Multicast Information Theory | p. 7 |
Overview of Multicast Key Management | p. 11 |
Requirements for Centralized Group Key Management | p. 13 |
Basic Polynomial Interpolation Scheme | p. 15 |
Resistance to Attack | p. 17 |
Anonymity Reduces Communication Overhead | p. 18 |
Extending to a Scalable Protocol | p. 19 |
Basic Protocol Primitives | p. 21 |
Advanced Protocol Operations | p. 23 |
Architectural Considerations | p. 26 |
Optimization of Tree Degree for Communication | p. 26 |
Binomial Occupancy Model | p. 30 |
Communication Overhead | p. 32 |
Computational Complexity | p. 35 |
Chapter Summary | p. 36 |
Group Key Agreement Techniques in Heterogeneous Networks | p. 39 |
Introduction | p. 39 |
Group DH Overview | p. 41 |
Conference Trees and the Butterfly Scheme | p. 43 |
Computational Considerations | p. 49 |
Minimizing Total Cost | p. 49 |
Budget Constraints | p. 51 |
Combined Budget and Cost Optimization | p. 54 |
Efficiency and Feasibility Evaluation | p. 56 |
Comparison of Total Cost | p. 56 |
Feasibility Comparison | p. 58 |
System Sensitivity to False Costs | p. 62 |
Sensitivity to Approximate Costs | p. 62 |
Sensitivity to Costs from Untrusty Users | p. 64 |
Chapter Summary | p. 68 |
Optimizing Rekeying Costs in Group Key Agreement | p. 71 |
Join-Exit Tree for Reducing Latency in Key Agreement Protocols | p. 72 |
Time-efficiency Measurement | p. 72 |
Join-Exit Tree (JET) Topology | p. 73 |
The Join Tree Algorithm | p. 74 |
The Exit Tree Algorithm | p. 80 |
Performance Analysis | p. 83 |
Optimizing Rekeying Cost | p. 85 |
Performance Metric Review | p. 85 |
PFMH Key Tree Structure and Basic Procedures | p. 87 |
PACK: an PFMH tree-based contributory group key agreement | p. 97 |
Performance Evaluation and Comparison | p. 107 |
Contributory Group Key Agreement with Key Validation | p. 109 |
Chapter Summary | p. 110 |
Optimizing Multicast Key Management for Cellular Multicasting | p. 113 |
Targeting Property of Rekeying Messages | p. 114 |
Topology-aware Key Management | p. 115 |
Topology-aware Key Management in Cellular Wireless Network | p. 115 |
Key Tree Design | p. 116 |
Performance Metrics | p. 117 |
Handoff Schemes for TMKM Tree | p. 118 |
Performance Analysis | p. 122 |
Separability of the Optimization Problem | p. 126 |
Optimizing TMKM Tree Design | p. 127 |
Dynamic membership model | p. 128 |
ALX tree structure | p. 129 |
User subtree design | p. 132 |
BS subtree design | p. 133 |
SH subtree design | p. 134 |
Performance Evaluation | p. 136 |
One-SH systems | p. 136 |
SH subtree design methods | p. 139 |
Multiple-SH systems | p. 140 |
Chapter Summary | p. 142 |
Key Management and Distribution for Securing Multimedia Multicasts | p. 143 |
A Basic Key Management Scheme | p. 145 |
Key Refreshing | p. 146 |
Member Join | p. 147 |
Member Departure | p. 147 |
Distribution of Rekeying Messages for Multimedia | p. 148 |
Media-Independent Channel | p. 150 |
Media-Dependent Channel | p. 152 |
An Improved Rekeying Message Format | p. 155 |
Basic Message Form | p. 156 |
Security Analysis of Residue-based Method | p. 157 |
Achieving Scalability | p. 163 |
System Feasibility Study | p. 166 |
Extensions to Multilayered Services | p. 169 |
Chapter Summary | p. 170 |
Hierarchical Access Control for Multi-Group Scenarios | p. 175 |
Hierarchical Access Control: Problem Formulation | p. 176 |
System description | p. 176 |
Security requirements | p. 177 |
Data encryption and hierarchical key management | p. 178 |
Centralized Multi-group Key Management Scheme | p. 179 |
Independent key trees for hierarchical access control | p. 179 |
Multi-group key management scheme | p. 179 |
Performance Measures and Analysis | p. 184 |
Storage overhead | p. 185 |
Rekey overhead | p. 188 |
Simulations and Performance Comparison | p. 189 |
Statistical dynamic membership model | p. 189 |
Performance with different group size | p. 191 |
Scalability | p. 192 |
Performance with different transition probability | p. 192 |
Simulation of multi-service applications | p. 196 |
Contributory Multi-group Key Management | p. 196 |
Related Work | p. 199 |
Chapter Summary | p. 200 |
Protecting Membership Information in Secure Multicasting | p. 203 |
GDI Disclosure in Centralized Key Management Schemes | p. 204 |
Attack 1: Estimation of J(t[subscript 0], t[subscript 1]) and L(t[subscript 0], t[subscript 1]) from rekeying-message format | p. 205 |
Attack 2: Estimation of the group size from the rekeying-message-size | p. 206 |
Attack 3: Estimation of group size based on key IDs | p. 208 |
Discussion on three attacks | p. 211 |
GDI vulnerability in prevalent key management schemes | p. 212 |
Defense Techniques | p. 213 |
Optimization | p. 218 |
The leakage of GDI | p. 218 |
Communication Overhead | p. 220 |
System Optimization | p. 221 |
Simulations | p. 221 |
GDI Disclosure and Protection in Contributory Key Management Schemes | p. 223 |
Fully and Partially Contributory Key Management Schemes | p. 226 |
GDI Disclosure in Contributory Key Management Schemes | p. 227 |
The Cost of Preventing GDI leakage | p. 227 |
More on GDI Leakage Problem | p. 228 |
Chapter Summary | p. 228 |
Reducing Delay and Enhancing DoS Resistance in Multicast Authentication | p. 231 |
Background Literature and TESLA | p. 232 |
Related Work | p. 232 |
TESLA Overview | p. 234 |
Examination of Trust in TESLA | p. 235 |
Staggered TESLA: Multi-Grade Multicast Authentication | p. 236 |
Format of the Packet | p. 237 |
Multi-Grade Source Authentication | p. 238 |
Reduced-Delay Multicast Authentication Schemes | p. 243 |
Staggered TESLA with Proximity Protection | p. 243 |
Distributed Key Distributors | p. 245 |
Buffer Requirements and Tradeoffs | p. 246 |
Simulations and Performance Analysis | p. 251 |
Simulations on Multi-Grade Authentication | p. 251 |
Performance Analysis of Staggered TESLA | p. 252 |
Impact of the Locations of Adversaries | p. 255 |
Simulation on Reducing Authentication Delay | p. 260 |
Conclusion | p. 262 |
An Authentication Service for Sensor and Ad Hoc Networks | p. 265 |
Introduction | p. 265 |
Hierarchical Sensor Network | p. 266 |
TESLA and TESLA Certificates | p. 268 |
TESLA Certs | p. 269 |
Overview of the Authentication Framework | p. 270 |
Certificates | p. 272 |
Initial Certs | p. 272 |
Runtime Certs | p. 273 |
Certificate Renewal | p. 274 |
Access Point | p. 274 |
Sensor Node | p. 274 |
Entity Authentication | p. 275 |
Access Point | p. 275 |
Forwarding Nodes | p. 275 |
Sensor Nodes | p. 276 |
Roaming and Handoff | p. 277 |
Forwarding Nodes | p. 277 |
Sensor Nodes | p. 277 |
Data Origin Authentication | p. 278 |
Sending Sensor Data in Weak Mode | p. 278 |
Sending Sensor Data in Assured Mode | p. 279 |
Evaluation | p. 280 |
Security Analysis | p. 280 |
Performance Analysis | p. 281 |
Conclusion | p. 282 |
References | p. 287 |
Index | p. 301 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.