Secure Broadcast Communication : In Wired and Wireless Networks

個数:

Secure Broadcast Communication : In Wired and Wireless Networks

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 214 p.
  • 言語 ENG
  • 商品コード 9780792376507
  • DDC分類 621.38212

Full Description

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Contents

1. Introduction.- 1.1 Challenges of Broadcast Communication.- 1.2 Why is Security for Broadcasts Hard?.- 1.3 Security Requirements for Broadcast Applications.- 1.4 Novel Contributions.- 1.5 Scope of this Book.- 1.6 Book Overview.- 2. Cryptographic Fundamentals.- 2.1 Broadcast Network Requirements.- 2.2 Cryptographic Primitives.- 2.3 Efficiency of Cryptographic Primitives.- 2.4 Commitment Protocols.- 3. Tesla Broadcast Authentication.- 3.1 Requirements for Broadcast Authentication.- 3.2 The Basic TESLA Protocol.- 3.3 TIK: TESLA with Instant Key Disclosure.- 3.4 Time Synchronization.- 3.5 Variations.- 3.6 Denial-of-Service Protection.- 4. Biba Broadcast Authentication.- 4.1 The BiBa Signature Algorithm.- 4.2 The BiBa Broadcast Authentication Protocol.- 4.3 BiBa Broadcast Protocol Extensions.- 4.4 Practical Considerations.- 4.5 Variations and Extensions.- 4.6 One-Round BiBa is as secure as Multi-Round BiBa.- 4.7 Merkle Hash Trees for Ball Authentication.- 5. Emss, Mess, & Htss: Signatures for Broadcast.- 5.1 Efficient Multicast Stream Signature (EMSS).- 5.2 MESS.- 5.3 Variations.- 5.4 HTSS.- 6. Elk Key Distrubution.- 6.1 Introduction.- 6.2 Review of the LKH Key Distribution Protocol.- 6.3 Review of the OFT Key Distribution Protocol.- 6.4 Reliability for Key Update Messages.- 6.5 Four Basic Techniques.- 6.6 ELK: Efficient Large-Group Key Distribution.- 6.7 Applications and Practical Issues.- 6.8 Appendix.- 7. Sensor Network Security.- 7.1 Background.- 7.2 System Assumptions.- 7.3 Requirements for Sensor Network Security.- 7.4 Additional Notation.- 7.5 SNEP and µTESLA.- 7.6 Implementation.- 7.7 Evaluation.- 7.8 Application of SNEP: Node-to-Node Key Agreement.- 8. Related Work.- 8.1 General Broadcast Security.- 8.2 Broadcast Authentication.- 8.3 Broadcast Signature.- 8.4Digital Signatures Based on One-way Functions without Trapdoors.- 8.5 Small-Group Key Agreement.- 8.6 Large-Group Key Distribution.- 9. Conclusion.- 9.1 Open Problems.- 10. Glossary.