Optimal Scaleable Security Architectures in the presence of Colluding Mobile Traitors

Optimal Scaleable Security Architectures in the presence of Colluding Mobile Traitors

Title : Optimal Scaleable Security Architectures in the presence of Colluding Mobile Traitors
Authors :
No items found
Conference : 1999 Emerging Technologies Symposium on Wireless Communications and Wireless systems pp.1-5
Date: April 12 - April 12, 1999

We present the issues related to secure multicast communication,in the presence of members who may collaborate to compromise the integrity of the system’s security. We also show that the ability to compartmentalize the system compromise depends on the availability of trusted intermediate nodes.We also note that some variations of the recently proposed tree based schemes don’t provide the required level of security and may be compromised if two appropriate members are compromised. We present the analysis of the weakness of these schemes here. We further note that the currently available tree based key distribution schemes are not optimal, and choose the worst case solution for key assignment. We note that the claims, including the collusion, can be formally proved using basic concepts from source coding theory and entropy as in [4].

Download Full Paper