[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/FIT.2014.39guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication

Published: 17 December 2014 Publication History

Abstract

Transport Layer Security (TLS) provides reliable and in-order communication. However due to its retransmission behavior it causes delay that is inappropriate for real time applications. Datagram Transport Layer Security (DTLS) can be used as an efficient alternate for securing the real time communication because of its unreliable and out of order features. Real-time secure multicast communication is an effective technique which mainly focuses on 'key distribution', 'forward and backward security', 'participant's authentication' and scalability. An extensive research is available for providing security to peer-to-peer (P2P) application using DTLS. However, no specific efforts have been made regarding its use for securing multicast communication. This paper not only reviews the structure of DTLS protocol in terms of security but also proposes a secure reliable multicast scheme using DTLS.

Cited By

View all
  • (2018)The Defect of DTLS toward Detected Aged PacketsProceedings of the 2nd International Conference on Cryptography, Security and Privacy10.1145/3199478.3199496(34-39)Online publication date: 16-Mar-2018
  • (2016)JxActiniumProceedings of the 31st Annual ACM Symposium on Applied Computing10.1145/2851613.2851808(1611-1618)Online publication date: 4-Apr-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FIT '14: Proceedings of the 2014 12th International Conference on Frontiers of Information Technology
December 2014
378 pages
ISBN:9781479975051

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 December 2014

Author Tags

  1. DTLS
  2. Key Distribution
  3. Multicast Security
  4. TLS

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)The Defect of DTLS toward Detected Aged PacketsProceedings of the 2nd International Conference on Cryptography, Security and Privacy10.1145/3199478.3199496(34-39)Online publication date: 16-Mar-2018
  • (2016)JxActiniumProceedings of the 31st Annual ACM Symposium on Applied Computing10.1145/2851613.2851808(1611-1618)Online publication date: 4-Apr-2016

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media