DocumentCode
2803272
Title
Optimal scalable security architectures in the presence of colluding mobile traitors
Author
Poovendran, Radha ; Baras, John S.
Author_Institution
Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
fYear
1999
fDate
1999
Firstpage
18.1
Lastpage
18.5
Abstract
We present the issues related to secure multicast communication, in the presence of members who may collaborate to compromise the integrity of the system´s security. We also show that the ability to compartmentalize the system compromise depends on the availability of trusted intermediate nodes. We also note that some variations of the recently proposed tree-based schemes do not provide the required level of security and may be compromised if two appropriate members are compromised. We present the analysis of the weakness of these schemes here. We further note that the currently available tree-based key distribution schemes are not optimal, and choose the worst-case solution for key assignment. We note that the claims, including the collusion, can be formally proved using basic concepts from source coding theory and entropy
Keywords
cryptography; data integrity; entropy codes; multicast communication; optimisation; source coding; telecommunication security; trees (mathematics); colluding mobile traitors; entropy; integrity; key assignment; optimal scalable security architectures; secure multicast communication; source coding theory; tree-based key distribution schemes; trusted intermediate nodes; Artificial satellites; Collaboration; Communication networks; Cryptography; Educational institutions; Electronic mail; Intelligent networks; Internet; Multicast communication; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications and Systems, 2000. 1999 Emerging Technologies Symposium
Conference_Location
Richardson, TX
Print_ISBN
0-7803-5554-7
Type
conf
DOI
10.1109/ETWCS.1999.897336
Filename
897336
Link To Document