Copyright: 2003
Pages: 334
ISBN: 9781580533423

Our Price: $99.00
The product is currently out of stock, current quantity is 0.
Our Price: $84.00

If Internet security is an important part of your job responsibility, this first-of-its-kind book is essential reading. It presents detailed coverage of multicast security from the leading developer of the standards. This unique resource discusses the security issues related to IP multicast networks, protocols and other group communications technologies. New algorithms and protocols for multi-party secure communication are provided for easy reference. The book looks at the security issues and solutions under three broad categories: data authentication, key management, and policies. Technical managers will want to use this book as a guide to the current state of multicast and group security, without necessarily having to know all the detailed algorithms. Computer scientists and R&D personnel will use the book as a survey of the technologies, approaches and algorithms used to provide a secure multicast solution. This handy reference helps you ensure efficient and secure distribution of data (real-time or delayed); security of IP-based conferencing on the Internet and security of networks that use IP multicast technologies; security of video on demand and other IP-TV applications; and security of single-source satellite broadcasts to multiple receivers and multi-party networked computer games.
Table Of Contents
Introduction - Motivation for Multicast Security. Multicast Content Protection. Infrastructure Protection. Applications of Secure Multicasting. Roadmap.; Framework for Multicast and Group Security - The Problem Scope Of Multicast Security. Fundamental Issues. Transport and Applications Issues. The IETF Problem Scope for Multicast and Group Security. Three Problem Areas in the Management of Keying Material. The Building Blocks Approach. Multicast Data Authentication - Issues in Multicast Data Authentication. Digital Signatures for Source Authentication. Hash Chaining to Authenticate Streaming Data. MAC-Based Source Authentication of Unreliable Streams. Ipsec ESP and MESP. Introduction to Group Key Management - A Model for Group Key Management. Requirements in Group Key Management. Security Requirements of Group Key Management. Group Security Association (GSA) Management. Classification of the Group Key Management Problem. Architectures and Protocols for Group Key Management - Architectural Issues and Motivations. The Internet Keying Architecture for Multicast. Iolus. Key Distribution Protocols : GKMP, GSAKMP, GDOI. Group Key Management Algorithms - Multicast Key Management With Arbitrarily Revealed Key Sequences. Logical Key Hierarchy (LKH). One-Way Function Trees (OFT). Reliable Transport of Rekey Messages. Stateless Key Revocation Algorithms. Group Security Policy - Group Security Policy Framework. Classification of Group Security Policy. Group Security Policy Specification. Policy Negotiation and Reconciliation. Group Security Policy Enforcement. Securing Multicast Routing Protocols - The Three Components of Multicast Security. Overview of Multicast Routing. Security Requirements in Unicast and Multicast Routing. PIM-SM Security. MSDP Security. IGMP Security. Security in Other Routing Protocols. Security in Reliable Multicast Protocols - Classification of RM Protocols. Generic Security Requirements for RM Protocols. Security of TRACK Protocols. Security of NORM Protocols. Security of FEC-Based Protocols. Applications of Multicast and their Security - Stock Market Data Distribution. Local Area IP-Television. Non Real-Time Multicast Distribution. SecureGroups Project. Conclusion and Future Work - IETF Multicast Security Framework. Secure Multicast Data Transmission. Group Key Distribution. Policy.; Glossary. Index.;


  • Lakshminath R. Dondeti Lakshminath R. Dondeti is a senior research engineer in the advanced technology group at Nortel Networks, Billerica, MA. Dr. Dondeti received his B.E. from Motilal Nehru Regional Engineering College, Allahabad, India. He received his M.S. and Ph.D. from The University of Nebraska-Lincoln, all in computer science.
  • Thomas Hardjono Thomas Hardjono is a Principal Scientist in the CTO Office at VeriSign, Inc., Mountain View, CA. Dr. Hardjono received his B.Sc. (Hons) in computer science from the University of Sydney, and Ph.D. in computer science from the University of New South Wales, Sydney, Australia.