Secure group communication protocol for distributed systems

In distributed applications like groupware, group communication among multiple entities is required. The local area networks (LANs) and radio networks provide broadcast communication at the media access control (MAC) layer, that is, every entity can receive every protocol data unit (PDU) transmitted in the network. Group communication among multiple entities can be easily realized by these networks. One problem in the broadcast network is how to provide secure communication for the group. In this paper, we discuss how to provide secure group communication in the presence of attacks by malicious entities. The protocol is based on the distributed control scheme by using less-secure broadcast networks. A group of entities is named a cluster. By the protocol, only and all the entities in the cluster can agree on a same secret key by exchanging the nonce enciphered by the public key. A subset of the cluster may require such secure communication that the other entities in the cluster cannot join the communication. In this paper, we discuss how to establish the secure subcluster communication in the cluster.<<ETX>>

[1]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[2]  滝沢 誠,et al.  RELIABLE BROADCAST COMMUNICATION , 1990 .

[3]  Kenneth P. Birman,et al.  Reliable communication in the presence of failures , 1987, TOCS.

[4]  LamportLeslie Time, clocks, and the ordering of events in a distributed system , 1978 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Akihito Nakamura,et al.  Priority-based total and semi-total ordering broadcast protocols , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.

[7]  S. Tanenbaum,et al.  GROUP COMMUNICATION IN THE AMOEBA DISTRIBUTED , 1991 .

[8]  Akihito Nakamura,et al.  Partially ordering broadcast (PO) protocol , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[9]  Roger M. Needham,et al.  Authentication revisited , 1987, OPSR.

[10]  Martín Abadi,et al.  Authentication: A Practical Study in Belief and Action , 1988, TARK.

[11]  M. Takizawa,et al.  Totally ordering broadcast (TO) protocol on the Ethernet , 1989, Conference Proceeding IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[12]  Akihito Nakamura,et al.  Reliable broadcast protocol for selectively partially ordering PDUs (SPO protocol) , 1991, [1991] Proceedings. 11th International Conference on Distributed Computing Systems.