rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780387229706

Secure Group Communications Over Data Networks

by ; ;
  • ISBN13:

    9780387229706

  • ISBN10:

    0387229701

  • Format: Hardcover
  • Copyright: 2004-10-01
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $139.00 Save up to $103.36
  • Digital
    $77.22*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over data networks. It offers an overview of secure algorithms and protocols for group communication linking areas such as applied cryptography and computer networking. Also included is a coverage of challenges in deploying secure group communication-based applications over wireless networks. These challenges include the limited computational power of mobile devices, susceptibility of wireless networks to intrusion and unauthorized access and mobility of nodes in a wireless ad-hoc network environment. Secure Group Communications Over Data Networks provides a wealth of information for network architects, IT Professionals, computer scientists, and advanced students of computer science and computer engineering in the fields of networking, computer security and software applications development.

Table of Contents

Dedication v
List of Figures
xi
List of Tables
xv
Preface xvii
Acknowledgments xix
Introduction
1(16)
Overview of Secure Group Communications
1(2)
Preliminaries
3(5)
Enabling Technologies
8(5)
Multicast
8(1)
Directed, Subgroup, Scoped and Multiple Multicasts
9(1)
Cryptosystems
9(2)
Two-party Diffie-Hellman Key Exchange
11(2)
Group Dynamics and Security
13(2)
Outline
15(2)
Typical Group Key Management Schemes
17(32)
Classification of Typical Group Key Management Schemes
18(2)
Public-Key based Secure Group Communication Schemes
20(3)
Reversible Parametric Sequence (RPS)
20(2)
Secure Transmission Backbone (STB)
22(1)
Secret-Key based Secure Group Communication Schemes
23(5)
Core Based Tree (CBT)
23(1)
Iolus
24(1)
Dual Encryption Protocol (DEP)
25(3)
Group Key Management based on Hierarchical Clusters
28(9)
Layers, Clusters and Keys
28(2)
Key Management
30(3)
Clustering Protocol
33(4)
N-party Diffie-Hellman Key Exchange Suite
37(12)
ING Protocol
37(2)
BD Protocol
39(1)
GDH Protocols
39(1)
GDH.1
39(2)
GDH.2
41(1)
GDH.3
42(1)
STR Protocol
43(2)
A Protocol without Member Serialization
45(1)
Summarization of n-party Diffie-Hellman Protocols
46(3)
Tree Based Key Management Schemes
49(42)
Centralized Key Distribution based on Tree Structures
50(26)
Key Tree -- Logical Key Hierarchy (LKH)
50(2)
Bursty Behavior and its Efficient Implementation
52(1)
Bursty Behavior and Properties
52(2)
Bursty Algorithm
54(3)
Theoretical Analysis
57(2)
d -- ary Key Tree
59(1)
Member-Oriented Rekeying
60(2)
Key-Oriented Rekeying
62(1)
Group-Oriented Rekeying
63(1)
Performance of Bursty Operation in d -- ary Key Trees
64(1)
One-way Function Tree (OFT)
65(1)
One-way Function Chain (OFC)
66(3)
Collusion Attacks on OFT and Improvement
69(3)
Group Key Management based on Boolean Function Minimization Technique
72(4)
Distributed Key Agreement based on Tree Structures
76(15)
Tree based Group Diffie-Hellman Scheme (TGDH)
76(2)
Block-Free TGDH Key Agreement (BF-TGDH)
78(1)
BF-TGDH Principle
78(3)
BF-TGDH Rekeying Operations
81(1)
Performance and Security of BF-TGDH
82(1)
Distributed Scalable sEcure Communication (DISEC)
83(2)
Discovery of the Neighbor
85(1)
Key Association Groups
85(1)
Join Operation
86(2)
Leave Operation
88(3)
Dynamic Conferencing Schemes
91(14)
Dynamic Conferencing and a Naive Solution
92(1)
Public-Key based Dynamic Conferencing Scheme (PKDC)
92(1)
Chinese Remainder Theorem based (Secure Lock) Dynamic Conferencing Scheme
93(1)
Symmetric Polynomial based Dynamic Conferencing Scheme
94(2)
Limited Symmetric Polynomial based DC Scheme
94(1)
Extended Symmetric Polynomial based DC Scheme
95(1)
Tree based Dynamic Conferencing Scheme
96(5)
Key Tree based Interval Multicast and DC (IDC)
96(2)
An Efficient and Scalable Key Tree based DC Scheme (KTDC)
98(3)
BF-TGDH based Dynamic Conferencing (BF-TGDH DC)
101(1)
Discussion and Comparisons
101(4)
Secure Group Communications with Hierarchical Access Control
105(22)
Classification
105(1)
Unconditionally Secure Keying Schemes for HAC
106(2)
One-way Function Schemes for HAC
108(6)
The Akl-Taylor Scheme
109(1)
Flexible Access Control with Master Keys
110(2)
Lin's Scheme
112(1)
Sandhu's Scheme
113(1)
Index based Scheme for SGC with HAC
114(8)
Principle
114(2)
Key Management
116(1)
Key Distribution
116(1)
Subgroup Dynamics
116(1)
Member Dynamics
117(1)
Performance Analysis
118(1)
Security Issues
119(2)
Properties
121(1)
CRT Based Scheme for SGC with HAC
122(5)
CRTHACS Components and Initialization
122(2)
Data Communication
124(1)
Dynamic Key Management
125(1)
Security and Performance Analysis
125(2)
SGC Challenges and SGC for Wireless Networks
127(22)
Factors Enabling SGC Functionality
127(3)
Admission Control and Membership Management
127(1)
Message/Packet Source Authentication
128(1)
Coordination: Timing and Versioning in SGC
129(1)
Broadcast Authentication
130(1)
SGC in Wireless Environments
130(19)
Topology Matching Key Management
132(1)
Key Management for TMKM
133(2)
Administration-scoped Key Management
135(5)
SGC over Ad Hoc Networks
140(1)
Securing Ad Hoc Networks with a Large Number of Nodes
140(5)
Desired Properties for SGC over Ad Hoc Networks
145(4)
Concluding Remarks
149(4)
Summary of Book Contents
149(1)
Exemplary Applications
150(1)
Secure Teleconferencing
150(1)
Virtual Private Networks (VPN)
150(1)
Secure Grid Computing
151(1)
Secure Collaborative Work
151(1)
Conclusion
151(2)
References 153(8)
About the Authors 161(4)
Index 165

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program