Abstract
A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s.
Similar content being viewed by others
References
Akl S G, Taylor P D. Cryptographic solution to a problem of access control in a hierarchy[J]. ACM Trans Computer Systems, 1983, 1(3): 239–248.
Lin C H. Dynamic key management scheme for access control in a hierarchy[J]. Computer Communications, 1997, 20(15): 1381–1385.
Tzeng W G. A time-bound cryptographic key assignment scheme for access control in a hierarchy [J]. IEEE Trans on Knowledge and Data Engineering, 2002, 14(1): 182–188.
Chang C C, Hwang R J. Cryptographic key assignment scheme for access control in a hierarchy[J]. Information Systems, 1992, 17(3): 243–247.
Lin C H, Chang C, Lee R C. A new public-key cipher system based upon the Diophantine equations [J]. IEEE Trans on Computers, 1995, 44(1): 13–19.
Chang C C, Lin C H, Lee W, et al. Secret sharing with access structures in a hierarchy[A]. Proc 18th International Conference on Advanced Information Networking and Application (AINA’04) [C]. Kyushu: IEEE Computer Society, 2004. 31–34.
Lu W W. Compact multidimensional broadband wireless: the convergence of wireless mobile and access [J]. IEEE Communications Magazine, 2000, 38(11): 119–123.
Otsu T, Umeda N, Yamao Y. System architecture for mobile communication systems beyond IMT-2000[A]. Proc 44th IEEE Global Telecommunications Conference[C]. San Antonio: IEEE Communications Society, 2001. 538–542.
Zahariadis T B, Vaxevanakis K G, Tsantilas C P, et al. Global roaming in next-generation networks[J]. IEEE Communications Magazine, 2002, 40(2): 145–151.
Morand L, Tessier S. Global mobility approach with mobile IP in all IP networks[A]. Proc 2002 IEEE International Conference on Communications[C]. New York: IEEE Communications Society, 2002. 2075–2079.
Wang G, Cao J, Chan K C C. A reliable totally-ordered group multicast protocol for mobile Internet [A]. Proc IEEE 33rd International Conference on Parallel Processing Workshops (ICPPW 2004) [C]. Montreal: IEEE Computer Society, 2004. 108–115.
Mittra S. Iolus: a framework for scalable secure multicasting[J]. ACM SIGCOMM Computer Communication Review, 1997, 27 (4): 227–288.
Tan K J, Zhu H W. A conference key distribution scheme based on the theory of quadratic residues[J]. Computer Communications, 1999, 22(8): 735–738.
Chou J S, Lin C H, Lee T Y. A novel hierarchical key management scheme based on quadratic residues [A]. Proc 2nd International Symposium on Parallel and Distributed Processing and Applications [C]. Hong Kong: Springer-Verlag, 2004. 858–865.
Lee N, Hwang T. Comments on dynamic key management schemes for access control in a hierarchy[J]. Computer Communications, 1999, 22(1): 87–89.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Project(60503007) supported by the National Natural Science Foundation of China; project(05JJ30118) supported by the Natural Science Foundation of Hunan Province; project(G-YY41) supported by the Hong Kong Polytechnic University Central Research Grant
Rights and permissions
About this article
Cite this article
Wang, Gj., Liao, L., Cao, Jn. et al. A novel secure multicast scheme in mobile Internet. J Cent. South Univ. Technol. 12, 720–725 (2005). https://doi.org/10.1007/s11771-005-0076-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11771-005-0076-z