Key management framework for ip multicast infrastructure security

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The IP multicast routing infrastructure requires the authentication of control messages and also of data messages. The current work identifies the various categories of authentication keys required within a multicast distribution tree and presents a basic model for their key-management. It also introduces the concept of core authentication routers within the distribution tree that have the additional burdensome task of authenticating data messages. An approach to the management of keys that authenticate control messages is then presented, illustrated using the example of the key arrangement defined for the PIM multicast routing protocol.

Cite

CITATION STYLE

APA

Hardjono, T. (1999). Key management framework for ip multicast infrastructure security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1597, pp. 385–397). Springer Verlag. https://doi.org/10.1007/3-540-48888-x_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free