Publications

Detailed Information

Efficient Key Management Schemes in Multicast Communication

DC Field Value Language
dc.contributor.advisor서승우-
dc.contributor.author제동현-
dc.date.accessioned2017-07-13T06:53:59Z-
dc.date.available2017-07-13T06:53:59Z-
dc.date.issued2012-08-
dc.identifier.other000000003981-
dc.identifier.urihttps://hdl.handle.net/10371/118855-
dc.description학위논문 (박사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2012. 8. 서승우.-
dc.description.abstract엔터테인먼트, 통신, 기기 제어와 같은 다양한 어플리케이션에 대한 요구가 증가하고 네트워크 기술이 발달되면서, 멀티캐스트 통신은 한 번의 전송으로 그룹 사용자들에게 동시에 메시지를 전송할 수 있기 때문에 통신 부하를 줄이기 위한 유망한 솔루션들 중 하나가 되고 있다. 그러나 정보 노출이 주요한 관심사중 하나가 됨에 따라 키 관리 방법은 멀티캐스트 통신에서 상업용 어플리케이션을 성공적으로 보급하는데 필수적인 요소로 고려되고 있다. 유니캐스트와 다르게 멀티캐스트의 확장성은 데이터 기밀성을 제공하기 위한 비밀 키를 관리하는데 주요한 장애물이다. 따라서 본 논문에서는 멀티캐스트 사용자들이 비밀 키를 관리하는데 보안과 자원 요구사이의 관계에 대해서 초점을 맞추고, 멀티캐스트 통신에서 다양한 효율적인 키 관리 방법들에 대하여 제안한다: 연산 저장에 효율적인 키 트리 관리 프로토콜, 안전한 그룹 통신을 위한 최적 키 갱신 주기, 그리고 안전한 자동차용 멀티캐스트 통신을 위한 구성원의 역동성에 기반을 둔 키 관리 방법.-
dc.description.abstractAs the demand of various applications such as entertainment, communication, and device control has been increased and the network technologies have been advanced, multicast communication becomes one of the promising solutions to reduce the communication complexity because it can deliver a message to a group of users at a single transmission simultaneously. However, as the information exposure becomes one of the main concerns, key management scheme is considered as an essential factor in successfully deploying commercialized applications in multicast communication. On the contrary of unicast, the scalability of multicast is a major obstacle in managing a secret key to provide data confidentiality. Therefore, in this dissertation, I focus on the relations between the security and the resource requirements in managing the secret key among multicast members, and propose the several efficient key management schemes in multicast communication: Computation-and-Storage efficient key tree management protocol, Optimal batch rekeying interval for secure group communication, Membership Dynamics based Key Management for secure vehicular multicast communication.-
dc.description.tableofcontents1 Introduction 1
1.1 Background and Motivation 1
1.2 Organization of This Dissertation 3
1.2.1 Computation-and-Storage-Efficient Key Tree Management Protocol for Secure Multicast Communications 3
1.2.2 Optimal Batch Rekeying Interval for Secure Group Communication 4
1.2.3 Membership Dynamics based Key Management (MDKM) for Secure Vehicular Multicast Communications 5
2 Computation-and-Storage-Efficient Key Tree Management Protocol for Secure Multicast Communications 6
2.1 Introduction 6
2.2 Key Tree Structures and Key Update 11
2.2.1 Typical Key Tree Structure 12
2.2.2 Level-Homogeneous Key Tree Structure 14
2.2.3 Computation-and-Storage-Efficient Key Tree (CSET) 15
2.2.4 Key Update 17
2.2.5 Batch Rekeying 18
2.3 Computation-and-Storage-Efficient Key Tree(CSET) Management Protocol 19
2.3.1 Join Operation 20
2.3.2 Leave Operation 24
2.4 Cost Analysis 27
2.4.1 Analysis of the Computation Cost 27
2.4.2 Analysis of the Storage Cost 28
2.4.3 Analysis of the Communication Cost 28
2.4.4 Cost Tradeo?of CSET 32
2.5 Performance Evaluation 36
2.5.1 Simulation Setup 36
2.5.2 Comparison of Communication Cost Between Analysis and Simulation 37
2.5.3 Performance Evaluation of CSET 39
3 Optimal Batch Rekeying Interval for Secure Group Communication 49
3.1 Introduction 49
3.2 Background 53
3.3 New Batch Rekeying Scheme 54
3.3.1 Cost Definition 55
3.3.2 New Batch Rekeying Scheme 56
3.4 Cost Analysis of the Batch Rekeying 60
3.4.1 Analysis of Communication Cost 60
3.4.2 Analysis of Security Damage Cost 61
3.4.3 Analysis of Total Cost 63
3.5 Simulation Results and Discussion 64
3.5.1 Simulation Setup 64
3.5.2 Performance Evaluation 64
4 Membership Dynamics based Key Management (MDKM) for Secure Vehicular Multicast Communications 69
4.1 Introduction 69
4.1.1 Group Key Management 70
4.1.2 Group Key Management in Vehicular Environments 71
4.1.3 Contribution 73
4.1.4 Paper Organization 74
4.2 Model 75
4.2.1 Network Model 75
4.2.2 Service Model 76
4.2.3 Vehicle Model 76
4.2.4 Key Model 77
4.3 Membership Dynamics based Key Management (MDKM) 79
4.3.1 Membership Dynamics based Key Derivation 79
4.3.2 Membership Dynamics based Key Management (MDKM) 82
4.4 Cost Analysis 91
4.4.1 Computation Cost 91
4.4.2 Storage Cost 92
4.4.3 Communication Cost 93
4.5 Cost Optimization 98
4.5.1 M/G/1 system 99
4.5.2 Key Management Cost 102
4.5.3 Cost Optimization 103
4.6 Simulation 103
4.6.1 Simulation Setup 104
4.6.2 Computation Cost 104
4.6.3 Storage Cost 106
4.6.4 Communication Cost 106
4.6.5 The Comparison of Key Management Cost 109
5 Conclusion 112
6 Appendix 115
6.1 Useful equations derived from the Binomial Theorem 115
-
dc.formatapplication/pdf-
dc.format.extent1418287 bytes-
dc.format.mediumapplication/pdf-
dc.language.isoen-
dc.publisher서울대학교 대학원-
dc.subjectSecure Multicast-
dc.subjectGroup Key Management-
dc.subjectKey Tree Management-
dc.subjectBatch Rekeying-
dc.subjectData Confidentiality-
dc.subjectVehicular Multicast Services-
dc.subjectAccess Control-
dc.subject.ddc621-
dc.titleEfficient Key Management Schemes in Multicast Communication-
dc.typeThesis-
dc.contributor.AlternativeAuthorDongHyun Je-
dc.description.degreeDoctor-
dc.citation.pagesvi, 122-
dc.contributor.affiliation공과대학 전기·컴퓨터공학부-
dc.date.awarded2012-08-
Appears in Collections:
Files in This Item:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share