ABSTRACT
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the group key after every join or leave request, we discuss an interval-based approach of rekeying. We consider three interval-based distributed rekeying algorithms, or interval-based algorithms for short, for updating the group key: 1) the Rebuild algorithm; 2) the Batch algorithm; and 3) the Queue-batch algorithm. Performance of these three interval-based algorithms under different settings, such as different join and leave probabilities,is analyzed. We show that the interval-based algorithms significantly outperform the individual rekeying approach and that the Queue-batch algorithm performs the best among the three interval-based algorithms. More importantly, the Queue-batch algorithm can substantially reduce the computation and communication workload in a highly dynamic environment. We further enhance the interval-based algorithms in two aspects: authentication and implementation. Authentication focuses on the security improvement, while implementation realizes the interval-based algorithms in real network settings. Our work provides a fundamental understanding about establishing a group key via a distributed and collaborative approach for a dynamic peer group.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333>.
"Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3136/distributed-collaborative-key-agreement-and-authentication-protocol-for-dynamic-peer-group-9333.
- Related Works
- Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
- Protocol Scrubbing Network Security Through Transparent Flow Modification (case Study Of Pressure World Cafe)
- A Novel Secure Communication Protocol For Adhoc Network (scp) (case Study Of Pleasure World Cafe )
- Development Of A Multi-drug Inventory System For A General Hospital
- Design And Implementation Of A Computerized Database Updating System For A Transaction –drive/operation A Case Study Of Nigerian Stock Exchange (nse) Lagos
- Design And Implementation Of A Network Based Security Information System
- Optimal Cryptographic Techniques
- Design And Implementation Of Software For Mortgage Banking
- Design And Implementation Of A Computerized Homeopathic Management System (a Case Study Of University Of Nigeria Teaching Hospital Enugu State)
- Design And Implementation Of A Computerized Documentation System Of Court Proceedings (a Case Study Of Federal High Court Enugu State)