Learn More
—A secure multicast communication is important for applications such as pay-per-view and secure videoconferencing. A key tree approach has been proposed by other authors to distribute the multicast group key in such a way that the rekeying cost scales with the logarithm of the group size for a join or depart request. The efficiency of this key tree approach(More)
—Security is an important concern in today's information age and particularly so in satellite systems, where eavesdropping can be easily performed. This paper addresses efficient key management for encrypted multicast traffic transmitted via satellite. We consider the topic of encrypting traffic in large multicast groups, where the group size and dynamics(More)
Mobile agent frameworks have attracted a lot of attention in recent years, seen as counterparts of static distributed object frameworks but allowing also for object or agent mobility. A lot of research is currently being carried out trying to assess their applicability to network management and control environments. In this paper, we present our experiences(More)
| Satellite communications are characterized by long delays, packet losses, and sometimes intermittent con-nectivity and link disruptions. The TCP/IP stack is ineffective against these impairments and even dedicated solutions, such as performance enhancing proxies (PEPs), can hardly tackle the most challenging environments, and create compatibility issues(More)
The concept of Delay Tolerant Networks (DTNs) has been utilized for wireless sensor networks, mobile ad hoc networks, interplanetary networks, pocket switched networks and suburb networks for developing region. Because of these application prospects, DTNs have received attention from academic community. Whereas only a few state of the art routing algorithms(More)
This paper presents an overview of the BRAHMS and GEOCAST projects and focuses on the security aspects of both projects. An overview of IPSEC and its variation called multi layer IPSEC is presented together with an overview of secure multicast key distribution architectures such as Logical Key Hierarchy. Finally the paper proposes an interworking solution(More)