期刊文献+

安全组播仿真系统研究与实现 被引量:1

Research and implementation of simulation system of secure multicast
下载PDF
导出
摘要 针对组密钥管理方案的性能评价问题,提出了一个安全组播管理系统仿真平台方案(GKMSP)并阐述了其仿真机制.平台的设计采用了模块化设计的方法,便于集成多种经典解决方案或经典算法,并使用了离散用户事件驱动的仿真机制,可仿真任意用户分布特征,以帮助分析或改进不同方案的性能.仿真试验中,成功地应用该平台对几种经典组密钥管理方案的性能做出评价,证明了该平台的有效性. Aiming at the performance evaluation of the group key management, a simulation platform for the performance evaluation of GKM (GKMSP) is presented ; meanwhile, simulation mechanism of the platform is analyzed. The p larization design. Its initial atform has integrated several typical schemes or algorithms by applying moduzation of discrete user events can simulate any application scene, which can help to analyze or improve each solution. Test results show that the platform can evaluate several classical GKM schemes successfully,proving the effectiveness of this platform.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2007年第3期331-334,共4页 Journal of Harbin Engineering University
关键词 安全组播 组密钥管理系统 仿真系统 secure multicast group key management simulation system
  • 相关文献

参考文献7

  • 1HARNEY Ho Group key management protocol (GKMP)specification[S]. RFC2093, 1997, 被引量:1
  • 2SHERMAN A T, MCGREW D A. Key establishment in large dynamic groups using one-way function trees[J].IEEE Trans on Software Engineering, 2003, 29 (5):444-458. 被引量:1
  • 3SUN Y, LIU K J R. Scalable hierarchical access controlin secure group communications[A]. INFOCOM 2004.Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies [C]. Hong Kong,China,2004. 被引量:1
  • 4屈劲,葛建华,蒋铭.安全组播密钥批更新算法研究[J].电子学报,2003,31(7):1046-1048. 被引量:12
  • 5赵欣,吴敏强,陈道蓄,谢立.一个自适应的安全组通信秘钥更新算法[J].电子学报,2003,31(5):654-658. 被引量:6
  • 6YANG Z, XU S, TAN Y. An efficient key updating scheme for multicast key management[A]. Asia-Pacific Optical Communications Conference 2004[C]. Beijing,China, 2004. 被引量:1
  • 7XU Shouzhi, YANG Zongkai, TAN Yunmeng,et al. An efficient batch rekeying scheme based on one-way function tree[A]. IEEE International Symposium on Communications and Information Technologies [C]. New York, USA, 2005. 被引量:1

二级参考文献11

  • 1S Setia, S Koussih, S Jajodia, E Harder. Kronos: A scalable group rekeying approach for secure multicast[A]. Proceedings of IEEE Symposium on Security and Privacy [ C]. Berkeley, CA. Los Alamitos, Calif:IEEE Computer Society, c2000, May 2000. 被引量:1
  • 2David Balenson, David McGrew, Alan Sherman. Key Management for Large Dynamic Groups:One- way Function Trees and Amortized Initialization[ S]. INTERNET-DRAFT, 1999. 被引量:1
  • 3S Mittra.IoIus:A framework scalable secure multicast[A] .Proceedings of ACM SIGCOMM' 97 [C]. Cannes, France, New York, NY, USA:ACM Press, September 1997. 被引量:1
  • 4Chung Kei Wong, Mohamed Gouda, Simon S Lam. Secure group communications using key graphs[A].Proceedings of ACM SIGCOMM'98[C] .New York,NY, USA:ACM Press,September 1998. 被引量:1
  • 5RFC2236. Internet Group Management Protocol, V. :2. [ S ]. 被引量:1
  • 6D Wallner, E Harder, R Agee. Key management for multicast: Issues and Architectures, IETF Internet Draft [Z]. 1998. 被引量:1
  • 7C K Wong, M G Gouda, S S Lain. Secure group communications using key graphs [A] .Proceedings of ACM SIC, COMM'98 [C] .New York:ACM Press, 1998.68 - 79. 被引量:1
  • 8S Setia, S Koussih, S Jajodia, E Harder. Kronos: a scalable group rekeying approach for secure multicast [ A ]. IEEE Symposium on Security and Privacy [C]. Oakland(USA) CA: IEEE Computer Society Press,2000.215-228. 被引量:1
  • 9X S Li,Y R Yang, M G Gouda, S S Lain. Batch rekeying for secure group communications [ A ]. Proceedings of Tenth International World Wide Web Conference [ C ]. Hongkong: ACM,2001. 被引量:1
  • 10K Almeoth, M Ammar. Collection and modeling of the join/leave behavior of multicast group members in mbone [ A]. Proceedings of High Performance Distributed Canputing Focus Workshop(HPDC'96) [ C].New York:IIPDC, 1996. 被引量:1

共引文献13

同被引文献11

  • 1Yu W, Sun Y, Liu K J. Minimization of rekeying cost for contributory group communications[J].IEEE GLOBECOM 2005, 2005, 1716-1720. 被引量:1
  • 2Wong C K, Gouda M, Lain S S. Secure group communications u-sing key graphs [ J ]. IEEE/ACM Trans. on Networking, 2000,8 (1):16-30. 被引量:1
  • 3Pegueroles J, Rico-Novella F. Balanced batch LKH: new proposal, implementation and performance evalution [ C ]. Proc. IEEE Symp. Computers and Comm. (ISCC), June 2003. 被引量:1
  • 4Ng W, Sun Z. Multi-layers LKH [ C ]. Proc. IEEE ICC, May 2005. 被引量:1
  • 5Wee H D, Michael H, Sun Z L, et al. Dynamic balanced key tree management for secure multicast communications[ J]. IEEE Trans. on Computers,May 2007,56(5) :590 -605. 被引量:1
  • 6Sherman A T, McCrrew D A. Key establishment in large dynamic groups using one-way function trees[ J]. IEEE Trans. on Software Engineering,May 2003,29(5) :444-458. 被引量:1
  • 7Lin J C, Lai F P, Lee H C. Efficient group key management protocol with one-way key derivation [ C ]. Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary ( LCN' 05). 被引量:1
  • 8Lee P P, Lui J C, Yau D K. Distributed collaborative key agreement protocols for dynamic peer groups[C]. In: Proc. of the ICNP,2002,53-62. 被引量:1
  • 9Banerjee S, Bhattacharjee B. Sealable secure group communication over IP multicast[J]. JSAC Special Issue on Network Support for Group Communication, 2002,20( 8 ) : 156-163. 被引量:1
  • 10Yang L, Lain G. Batch rekeying for secure group communications [C]. ACM SIGCOM 2001, San Diego, August 2001. 被引量:1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部