Learn More
ulticasting is an efficient communication mechanism for group-oriented applications such as video conferencing, interactive group games, and video on demand. IP multicast [1 ] saves bandwidth by sending the source traffic on a multicast tree that spans all the members of the group. In this communication model, groups are identified by a group address, and(More)
—Even though hierarchical group communication is a prominent communication model for a variety of applications , featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements,(More)
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current users. The bandwidth used for such(More)
The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support both mobile receivers and mobile sources. Unfortunately, the mobility of the multicast source is a challenging(More)
—The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy is defined using the access rights. The different resources are encrypted using different keys. Key management is a critical issue for scalable content access control. In this(More)
Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach based on a new entity called Mobility-aware Rendezvous Point (MRP) to hide the mobility of a mobile multicast source from the main multicast delivery tree and offer an optimal routing.(More)
Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the(More)