did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387688466

Network-aware Security for Group Communications

by ; ;
  • ISBN13:

    9780387688466

  • ISBN10:

    0387688463

  • Format: Hardcover
  • Copyright: 2007-10-12
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $179.99 Save up to $146.58
  • Buy Used
    $134.99
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications. This book aims to fill a growing need in the research community for a reference that describes the state of the art in securing group communications. Network-Aware Security for Group Communications focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).

Table of Contents

Prefacep. vii
Introductionp. 1
Book Overviewp. 3
Centralized Multi-user Key Managementp. 7
Basic Multicast Information Theoryp. 7
Overview of Multicast Key Managementp. 11
Requirements for Centralized Group Key Managementp. 13
Basic Polynomial Interpolation Schemep. 15
Resistance to Attackp. 17
Anonymity Reduces Communication Overheadp. 18
Extending to a Scalable Protocolp. 19
Basic Protocol Primitivesp. 21
Advanced Protocol Operationsp. 23
Architectural Considerationsp. 26
Optimization of Tree Degree for Communicationp. 26
Binomial Occupancy Modelp. 30
Communication Overheadp. 32
Computational Complexityp. 35
Chapter Summaryp. 36
Group Key Agreement Techniques in Heterogeneous Networksp. 39
Introductionp. 39
Group DH Overviewp. 41
Conference Trees and the Butterfly Schemep. 43
Computational Considerationsp. 49
Minimizing Total Costp. 49
Budget Constraintsp. 51
Combined Budget and Cost Optimizationp. 54
Efficiency and Feasibility Evaluationp. 56
Comparison of Total Costp. 56
Feasibility Comparisonp. 58
System Sensitivity to False Costsp. 62
Sensitivity to Approximate Costsp. 62
Sensitivity to Costs from Untrusty Usersp. 64
Chapter Summaryp. 68
Optimizing Rekeying Costs in Group Key Agreementp. 71
Join-Exit Tree for Reducing Latency in Key Agreement Protocolsp. 72
Time-efficiency Measurementp. 72
Join-Exit Tree (JET) Topologyp. 73
The Join Tree Algorithmp. 74
The Exit Tree Algorithmp. 80
Performance Analysisp. 83
Optimizing Rekeying Costp. 85
Performance Metric Reviewp. 85
PFMH Key Tree Structure and Basic Proceduresp. 87
PACK: an PFMH tree-based contributory group key agreementp. 97
Performance Evaluation and Comparisonp. 107
Contributory Group Key Agreement with Key Validationp. 109
Chapter Summaryp. 110
Optimizing Multicast Key Management for Cellular Multicastingp. 113
Targeting Property of Rekeying Messagesp. 114
Topology-aware Key Managementp. 115
Topology-aware Key Management in Cellular Wireless Networkp. 115
Key Tree Designp. 116
Performance Metricsp. 117
Handoff Schemes for TMKM Treep. 118
Performance Analysisp. 122
Separability of the Optimization Problemp. 126
Optimizing TMKM Tree Designp. 127
Dynamic membership modelp. 128
ALX tree structurep. 129
User subtree designp. 132
BS subtree designp. 133
SH subtree designp. 134
Performance Evaluationp. 136
One-SH systemsp. 136
SH subtree design methodsp. 139
Multiple-SH systemsp. 140
Chapter Summaryp. 142
Key Management and Distribution for Securing Multimedia Multicastsp. 143
A Basic Key Management Schemep. 145
Key Refreshingp. 146
Member Joinp. 147
Member Departurep. 147
Distribution of Rekeying Messages for Multimediap. 148
Media-Independent Channelp. 150
Media-Dependent Channelp. 152
An Improved Rekeying Message Formatp. 155
Basic Message Formp. 156
Security Analysis of Residue-based Methodp. 157
Achieving Scalabilityp. 163
System Feasibility Studyp. 166
Extensions to Multilayered Servicesp. 169
Chapter Summaryp. 170
Hierarchical Access Control for Multi-Group Scenariosp. 175
Hierarchical Access Control: Problem Formulationp. 176
System descriptionp. 176
Security requirementsp. 177
Data encryption and hierarchical key managementp. 178
Centralized Multi-group Key Management Schemep. 179
Independent key trees for hierarchical access controlp. 179
Multi-group key management schemep. 179
Performance Measures and Analysisp. 184
Storage overheadp. 185
Rekey overheadp. 188
Simulations and Performance Comparisonp. 189
Statistical dynamic membership modelp. 189
Performance with different group sizep. 191
Scalabilityp. 192
Performance with different transition probabilityp. 192
Simulation of multi-service applicationsp. 196
Contributory Multi-group Key Managementp. 196
Related Workp. 199
Chapter Summaryp. 200
Protecting Membership Information in Secure Multicastingp. 203
GDI Disclosure in Centralized Key Management Schemesp. 204
Attack 1: Estimation of J(t[subscript 0], t[subscript 1]) and L(t[subscript 0], t[subscript 1]) from rekeying-message formatp. 205
Attack 2: Estimation of the group size from the rekeying-message-sizep. 206
Attack 3: Estimation of group size based on key IDsp. 208
Discussion on three attacksp. 211
GDI vulnerability in prevalent key management schemesp. 212
Defense Techniquesp. 213
Optimizationp. 218
The leakage of GDIp. 218
Communication Overheadp. 220
System Optimizationp. 221
Simulationsp. 221
GDI Disclosure and Protection in Contributory Key Management Schemesp. 223
Fully and Partially Contributory Key Management Schemesp. 226
GDI Disclosure in Contributory Key Management Schemesp. 227
The Cost of Preventing GDI leakagep. 227
More on GDI Leakage Problemp. 228
Chapter Summaryp. 228
Reducing Delay and Enhancing DoS Resistance in Multicast Authenticationp. 231
Background Literature and TESLAp. 232
Related Workp. 232
TESLA Overviewp. 234
Examination of Trust in TESLAp. 235
Staggered TESLA: Multi-Grade Multicast Authenticationp. 236
Format of the Packetp. 237
Multi-Grade Source Authenticationp. 238
Reduced-Delay Multicast Authentication Schemesp. 243
Staggered TESLA with Proximity Protectionp. 243
Distributed Key Distributorsp. 245
Buffer Requirements and Tradeoffsp. 246
Simulations and Performance Analysisp. 251
Simulations on Multi-Grade Authenticationp. 251
Performance Analysis of Staggered TESLAp. 252
Impact of the Locations of Adversariesp. 255
Simulation on Reducing Authentication Delayp. 260
Conclusionp. 262
An Authentication Service for Sensor and Ad Hoc Networksp. 265
Introductionp. 265
Hierarchical Sensor Networkp. 266
TESLA and TESLA Certificatesp. 268
TESLA Certsp. 269
Overview of the Authentication Frameworkp. 270
Certificatesp. 272
Initial Certsp. 272
Runtime Certsp. 273
Certificate Renewalp. 274
Access Pointp. 274
Sensor Nodep. 274
Entity Authenticationp. 275
Access Pointp. 275
Forwarding Nodesp. 275
Sensor Nodesp. 276
Roaming and Handoffp. 277
Forwarding Nodesp. 277
Sensor Nodesp. 277
Data Origin Authenticationp. 278
Sending Sensor Data in Weak Modep. 278
Sending Sensor Data in Assured Modep. 279
Evaluationp. 280
Security Analysisp. 280
Performance Analysisp. 281
Conclusionp. 282
Referencesp. 287
Indexp. 301
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program