YANG Guo-qing, HUAN Zheng-liang, GE Ping-ju. A Security Multicast System Model Based on IPSec[J]. INFORMATION AND CONTROL, 2004, 33(2): 167-171.
Citation: YANG Guo-qing, HUAN Zheng-liang, GE Ping-ju. A Security Multicast System Model Based on IPSec[J]. INFORMATION AND CONTROL, 2004, 33(2): 167-171.

A Security Multicast System Model Based on IPSec

More Information
  • Received Date: July 20, 2003
  • Published Date: April 19, 2004
  • This paper discusses current research and application conditions of multicast. Then, a security multicast system model based on IPSec is presented. This model is a feasible solution to security multicast. The framework and the key modules are designed, the member roles and functions are defined, and the interaction mechanism in the modules are discussed. Finally, the prospects of its application are explored.
  • [1]
    Fenner W. RFC 2236 Internet Group Management Protocol, Version 2 [EB/OL]. http://www. ietf. org/rfc. html, 1997. 11.
    [2]
    Deering S E. RFC1112 Hostextensions for IP Multicasting [EB/OL]. http://www. ietf. org/rfc. html,1989.8.
    [3]
    Wallner D. RFC2627 Key Management for Multicast: Issues and Architectures [EB/OL]. http://www. ietf. org/ric. html, 1999.6.
    [4]
    Quinn B. RFC3170 IP Multicast Applications: Challenges and Solutions [EB/OL]. http://www. ietf. org/rfc. html, 2001.9.
    [5]
    DoraswamyI N,Harkins D.IPSec——新一代因特网安全标准[M].北京:机械工业出版社,2000.
  • Related Articles

    [1]DING Da, CAO Jie. Overview of Network Security of Cyber-Physical Systems[J]. INFORMATION AND CONTROL, 2019, 48(5): 513-521, 527. DOI: 10.13976/j.cnki.xk.2019.9160
    [2]SHANG Wenli, YANG Luyao, CHEN Chunyu, YIN Long, ZENG Peng, LIU Zhoubin. Lightweight Group Authentication Mechanism for Industrial Control System Terminals[J]. INFORMATION AND CONTROL, 2019, 48(3): 344-353. DOI: 10.13976/j.cnki.xk.2019.8539
    [3]ZHANG Kai, QIAN Huanyan. Optimal Power Allocation for Wireless Multicast Networks with Non-regenerative Relaying Based on Cooperative Communication Technology[J]. INFORMATION AND CONTROL, 2011, 40(3): 323-330.
    [4]LI Chang-bing, CAO Chang-xiu, LI Yin-guo, YU Yi-bin. A Multicast Tree Construction Algorithm Based on QoS Constraints[J]. INFORMATION AND CONTROL, 2008, 37(1): 81-86.
    [5]TIAN Yuan, JIANG Hai-wen, LI Ming-chu. A Group-Key Distribution Protocol for Highly Lossy Transmission Environment[J]. INFORMATION AND CONTROL, 2007, 36(1): 39-46.
    [6]TIAN Yuan, LI Ming-chu, LING Zhi-guang. An Enhanced Protocol for Source Authentication in Sensor Networks[J]. INFORMATION AND CONTROL, 2006, 35(6): 732-736,748.
    [7]QIN Ling, CHEN Ling, ZHOU Ri-gui, GU Qi, WU Yan. A Multicast Routing Algorithm Based on Ant Colony System[J]. INFORMATION AND CONTROL, 2006, 35(5): 545-550.
    [8]ZHENG Yan-fei, LI Hui, CHEN Ke-fei. Some Trends in the Security of Wireless Sensor Networks[J]. INFORMATION AND CONTROL, 2006, 35(2): 233-238.
    [9]WENG Yi-fang, JU Lei. DESIGN OF CHAOTIC SYNCHRONIZED SECURE COMMUNICA-TION SCHEME WITH TIME-VARYING PARAMETERS[J]. INFORMATION AND CONTROL, 2003, 32(2): 128-131.
    [10]SUN Liang, ZHANG Junguo, FAN Zhiping, PAN Dehui. STUDY ON THE PRICING MODEL OF STOCK DERIVATIVE SECURITY[J]. INFORMATION AND CONTROL, 1998, 27(4): 300-303.

Catalog

    Article views (1256) PDF downloads (55) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return