Skip to main content
Log in

A novel secure multicast scheme in mobile Internet

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akl S G, Taylor P D. Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Trans Computer Systems, 1983, 1(3): 239–248.

    Article  Google Scholar 

  2. Lin C H. Dynamic key management scheme for access control in a hierarchy[J]. Computer Communications, 1997, 20(15): 1381–1385.

    Article  Google Scholar 

  3. Tzeng W G. A time-bound cryptographic key assignment scheme for access control in a hierarchy [J]. IEEE Trans on Knowledge and Data Engineering, 2002, 14(1): 182–188.

    Article  Google Scholar 

  4. Chang C C, Hwang R J. Cryptographic key assignment scheme for access control in a hierarchy[J]. Information Systems, 1992, 17(3): 243–247.

    Article  Google Scholar 

  5. Lin C H, Chang C, Lee R C. A new public-key cipher system based upon the Diophantine equations [J]. IEEE Trans on Computers, 1995, 44(1): 13–19.

    Article  Google Scholar 

  6. Chang C C, Lin C H, Lee W, et al. Secret sharing with access structures in a hierarchy[A]. Proc 18th International Conference on Advanced Information Networking and Application (AINA’04) [C]. Kyushu: IEEE Computer Society, 2004. 31–34.

    Google Scholar 

  7. Lu W W. Compact multidimensional broadband wireless: the convergence of wireless mobile and access [J]. IEEE Communications Magazine, 2000, 38(11): 119–123.

    Article  Google Scholar 

  8. Otsu T, Umeda N, Yamao Y. System architecture for mobile communication systems beyond IMT-2000[A]. Proc 44th IEEE Global Telecommunications Conference[C]. San Antonio: IEEE Communications Society, 2001. 538–542.

    Google Scholar 

  9. Zahariadis T B, Vaxevanakis K G, Tsantilas C P, et al. Global roaming in next-generation networks[J]. IEEE Communications Magazine, 2002, 40(2): 145–151.

    Article  Google Scholar 

  10. Morand L, Tessier S. Global mobility approach with mobile IP in all IP networks[A]. Proc 2002 IEEE International Conference on Communications[C]. New York: IEEE Communications Society, 2002. 2075–2079.

    Google Scholar 

  11. Wang G, Cao J, Chan K C C. A reliable totally-ordered group multicast protocol for mobile Internet [A]. Proc IEEE 33rd International Conference on Parallel Processing Workshops (ICPPW 2004) [C]. Montreal: IEEE Computer Society, 2004. 108–115.

    Google Scholar 

  12. Mittra S. Iolus: a framework for scalable secure multicasting[J]. ACM SIGCOMM Computer Communication Review, 1997, 27 (4): 227–288.

    Google Scholar 

  13. Tan K J, Zhu H W. A conference key distribution scheme based on the theory of quadratic residues[J]. Computer Communications, 1999, 22(8): 735–738.

    Article  Google Scholar 

  14. Chou J S, Lin C H, Lee T Y. A novel hierarchical key management scheme based on quadratic residues [A]. Proc 2nd International Symposium on Parallel and Distributed Processing and Applications [C]. Hong Kong: Springer-Verlag, 2004. 858–865.

    Chapter  Google Scholar 

  15. Lee N, Hwang T. Comments on dynamic key management schemes for access control in a hierarchy[J]. Computer Communications, 1999, 22(1): 87–89.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wang Guo-jun.

Additional information

Foundation item: Project(60503007) supported by the National Natural Science Foundation of China; project(05JJ30118) supported by the Natural Science Foundation of Hunan Province; project(G-YY41) supported by the Hong Kong Polytechnic University Central Research Grant

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Gj., Liao, L., Cao, Jn. et al. A novel secure multicast scheme in mobile Internet. J Cent. South Univ. Technol. 12, 720–725 (2005). https://doi.org/10.1007/s11771-005-0076-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-005-0076-z

Key words

CLC number

Navigation