Security Issues and Solutions in Multicast Environment through Tree based Scheme

Article ID

OZUEL

Security Issues and Solutions in Multicast Environment through Tree based Scheme

DR. S.SANTHI PRIYA
DR. S.SANTHI PRIYA Auroras Engineering College
B.V.S.S.R.S.SASTRY
B.V.S.S.R.S.SASTRY
K. AKSHITHA
K. AKSHITHA
DOI

Abstract

Multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source creating copies automatically in other network elements, such as routers, only when the topology of the network requires it. Multicasting security is hard because of Open group membership, everyone gets same pack ets, Senders need not be members. We first present taxonomy of mu lticast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast, in particular known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a midpoi nt between traditional Message Authentication Codes and digital signatures. We also present an improved solution to the key revocation problem.

Security Issues and Solutions in Multicast Environment through Tree based Scheme

Multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source creating copies automatically in other network elements, such as routers, only when the topology of the network requires it. Multicasting security is hard because of Open group membership, everyone gets same pack ets, Senders need not be members. We first present taxonomy of mu lticast scenarios on the Internet and point out relevant security concerns. Next we address two major security problems of multicast communication: source authentication, and key revocation. Maintaining authenticity in multicast protocols is a much more complex problem than for unicast, in particular known solutions are prohibitively inefficient in many cases. We present a solution that is reasonable for a range of scenarios. Our approach can be regarded as a midpoi nt between traditional Message Authentication Codes and digital signatures. We also present an improved solution to the key revocation problem.

DR. S.SANTHI PRIYA
DR. S.SANTHI PRIYA Auroras Engineering College
B.V.S.S.R.S.SASTRY
B.V.S.S.R.S.SASTRY
K. AKSHITHA
K. AKSHITHA

No Figures found in article.

DR. S.SANTHI PRIYA. 1970. “. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 5): .

Download Citation

Journal Specifications
Classification
Not Found
Keywords
Article Matrices
Total Views: 20903
Total Downloads: 11041
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security Issues and Solutions in Multicast Environment through Tree based Scheme

DR. S.SANTHI PRIYA
DR. S.SANTHI PRIYA Auroras Engineering College
B.V.S.S.R.S.SASTRY
B.V.S.S.R.S.SASTRY
K. AKSHITHA
K. AKSHITHA

Research Journals