ABSTRACT
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the group key after every join or leave request, we discuss an interval-based approach of rekeying. We consider three interval-based distributed rekeying algorithms, or interval-based algorithms for short, for updating the group key: 1) the Rebuild algorithm; 2) the Batch algorithm; and 3) the Queue-batch algorithm. Performance of these three interval-based algorithms under different settings, such as different join and leave probabilities,is analyzed. We show that the interval-based algorithms significantly outperform the individual rekeying approach and that the Queue-batch algorithm performs the best among the three interval-based algorithms. More importantly, the Queue-batch algorithm can substantially reduce the computation and communication workload in a highly dynamic environment. We further enhance the interval-based algorithms in two aspects: authentication and implementation. Authentication focuses on the security improvement, while implementation realizes the interval-based algorithms in real network settings. Our work provides a fundamental understanding about establishing a group key via a distributed and collaborative approach for a dynamic peer group.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333.
- Related Works
- Design And Implementation Of A Computerized Airplane Passenger Manifest Information (a Case Study Of Sosoliso Airways)
- Design And Implementation Of A Computerised Tourism Information System A Case Study Of Tourism Board Enugu
- Design And Implementation Of A Computerized Pharmacy Management System ( Case Study Of Juhel Pharmaceuticals Ltd, Enugu)
- Design And Implementation Of A Database Management Software For A Confectionery Business
- Design And Implementation Of A Weather Forecasting Package For Aviation Industry (automated Flight Control System)
- Design And Implementation Of A Computersized National Identity Card Processing System (a Case Study Of National Identity Card, Anaoch Local Governemnt Area Anambra State.)
- Current Trends On Pc Monitors And Tv
- Design And Implemention Of A Computerized Hotel Front Office Management System A Case Study Of Hotel Presidental Enugu.
- Application And Challenges Of An Ad Hoc Network System
- Design And Implementation Of A Computerized Erosion Control Information System Case Study Of Ministry Of Works Enugu)