ABSTRACT
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the group key after every join or leave request, we discuss an interval-based approach of rekeying. We consider three interval-based distributed rekeying algorithms, or interval-based algorithms for short, for updating the group key: 1) the Rebuild algorithm; 2) the Batch algorithm; and 3) the Queue-batch algorithm. Performance of these three interval-based algorithms under different settings, such as different join and leave probabilities,is analyzed. We show that the interval-based algorithms significantly outperform the individual rekeying approach and that the Queue-batch algorithm performs the best among the three interval-based algorithms. More importantly, the Queue-batch algorithm can substantially reduce the computation and communication workload in a highly dynamic environment. We further enhance the interval-based algorithms in two aspects: authentication and implementation. Authentication focuses on the security improvement, while implementation realizes the interval-based algorithms in real network settings. Our work provides a fundamental understanding about establishing a group key via a distributed and collaborative approach for a dynamic peer group.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333.
- Related Works
- Design And Implementation Of A Computer Based Quality Assurance Monitoring System (a Case Study Of Anammco Nig Ltd Emene Enugu)
- A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)
- Remote Electricity Billing System Automation And Implementation -ejb (a Case Study Of Nepa)
- How To Improve Security Electronic Voting
- Telecom Inventory Maintenance Services Application With Error Tracking
- Design And Implementation Of A Computerized Commodity Exchange Information System (case Study Of Enugu State)
- A Card Based Security System (a Case Study Of Eco Bank)
- Design And Implementation Of A Computerized Telephone Line Allocation System (a Case Study Of Niitel Nigeria Limited Enugu Branch)
- Internet Security
- Distributed Metadata Management For Large Cluster-based Storage Systems