Judge et al., 2002 - Google Patents
Gothic: A group access control architecture for secure multicast and anycastJudge et al., 2002
View PDF- Document ID
- 1328272538382228825
- Author
- Judge P
- Ammar M
- Publication year
- Publication venue
- Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
External Links
Snippet
Multicast and anycast have received considerable attention due to their ability to support networked services. There are distinct and significant security vulnerabilities in both the multicast and anycast model including denial of service, theft or service, eavesdropping, and …
- 238000000034 method 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Judge et al. | Gothic: A group access control architecture for secure multicast and anycast | |
Dondeti et al. | Scalable secure one-to-many group communication using dual encryption | |
Canetti et al. | Multicast security: A taxonomy and some efficient constructions | |
Dondeti et al. | A dual encryption protocol for scalable secure multicasting | |
Kruus et al. | Techniques and issues in multicast security | |
US8230010B1 (en) | System, device, and method for controlling access in a multicast communication network | |
Castellucia et al. | Securing group management in IPv6 with cryptographically generated addresses | |
US8688077B2 (en) | Communication system and method for providing a mobile communications service | |
Mohamed et al. | OMAC: a new access control architecture for overlay multicast communications | |
Dunigan et al. | Group key management | |
Pimentel et al. | OCP: A protocol for secure communication in federated content networks | |
WO2006088751A2 (en) | Access control for mobile multicast | |
Gharout et al. | Key management with host mobility in dynamic groups | |
Tomar et al. | Secure Group Key Agreement with Node Authentication | |
Islam et al. | Sender access control in IP multicast | |
Dondeti | Efficient private group communication over public networks | |
Jiang et al. | A novel mix-based location privacy mechanism in Mobile IPv6 | |
Ueno et al. | A receiver authentication and group key delivery protocol for secure multicast | |
Fathi et al. | Protocols for purpose-restricted anonymous communications in IP-based wireless networks | |
Islam et al. | Sender access and data distribution control for inter-domain multicast groups | |
Aiash | A Comprehensive Security Framework for Heterogeneous IoTs | |
Aura et al. | Communications security on the Internet | |
Varadarajan et al. | Dynamic, distributed, secure multicast in active networks | |
Aye et al. | A key distribution scheme for secure multicast over ipv6 wireless networks | |
Park et al. | Internetwork access control using public key certificates |