Optimal Scalable Security Architectures in the Presence of Colluding Mobile Traitors

dc.contributor.advisorBaras, John S.en_US
dc.contributor.authorR. Poovendranen_US
dc.contributor.authorBaras, John S.en_US
dc.contributor.departmentISRen_US
dc.contributor.departmentCSHCNen_US
dc.date.accessioned2007-05-23T10:08:10Z
dc.date.available2007-05-23T10:08:10Z
dc.date.issued1999en_US
dc.description.abstractWe present the issues related to secure muiticast communication in the presence of members who may collaborate to compromise the integrity of the system's security. We also show that the ability to compartmentalize the system compromise depends on the availability of trusted intermediate nodes. <p>We also note that some variations of the recently proposed tree-based schemes don't provide the required level of security and may be compromised if two appropriate members are compromised. We present the analysis of the weakness of these schemes here. <p>We further note that the currently available tree-based key distribution schemes are not optimal, and choose the worst case solution for key assignment. We note that the claims, including the collusion, can be formally proved using basic concepts from source coding theory and entropy.<p><i>1999 IEEE Emerging Technologies Symposium on Wireless Communications and Systems</i>en_US
dc.format.extent235156 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/1903/6072
dc.language.isoen_USen_US
dc.relation.ispartofseriesISR; TR 1999-33en_US
dc.relation.ispartofseriesCSHCN; TR 1999-15en_US
dc.subjectkey distributionen_US
dc.subjectscalabilityen_US
dc.subjectGlobal Communication Systemsen_US
dc.titleOptimal Scalable Security Architectures in the Presence of Colluding Mobile Traitorsen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR_99-33.pdf
Size:
229.64 KB
Format:
Adobe Portable Document Format