Search In this Thesis
   Search In this Thesis  
العنوان
Multicast Security in Long Term
Evolution (LTE) Networks /
المؤلف
Eid, Esraa Mosleh Ibraheem.
هيئة الاعداد
باحث / إسراء مصلح إبراهيم عيد
مشرف / محسن محمد طنطاوي
مشرف / عدلي شحات تاج الدين
مناقش / محسن محمد طنطاوي
مناقش / عدلي شحات تاج الدين
الموضوع
Multicast Security.
تاريخ النشر
2013.
عدد الصفحات
88 P. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2013
مكان الإجازة
جامعة بنها - كلية الهندسة بشبرا - الهندسة الكهربائية
الفهرس
Only 14 pages are availabe for public view

from 107

from 107

Abstract

3GPP has started long term evolution (LTE) since 2004. The LTE
system provides higher data rate, lower delay, and improved coverage and
spectrum efficiency. With the characteristics of LTE, many creative
services, especially the multimedia services, which require more wireless
resource emerge.
We are currently witnessing an unbelievable technological
development; some may even say a breakthrough. Over the last decade,
there has been a rapid growth in the personal consumption of media.
Services like pay-per-view and video-on-demand are becoming more and
more common and are changing the way we look at multimedia – now users
can choose whatever media they want, whenever and wherever they want.
When we consider multimedia services (such as television or large file
downloads), we realize that the increasing traffic and congestion in the radio
spectrum caused by these can lead to degradation of the quality of service.
Many emerging applications are based upon a group communications model.
In particular, they require packet delivery from one or more authorized
senders to a large number of authorized receivers. In the Internet, multicast
has been used successfully to provide an efficient, best effort delivery
service to large groups. Securing group communications, i.e., providing
confidentiality, authenticity, and integrity of messages delivered between
group members, is a critical networking issue.
Another major issue is to update security keys (rekeying) when a user
joins or leaves the multicast group. For the rekeying of the group key all
members of the group should agree the rekeying of the key.
Abstract
ii
In this thesis, the performance of the Secure Multicast Overlay (SMO)
and the Group Security Association (GSA) is studied. We functionally
compare GSA with SMO in terms of data forwarding, Keys management
procedures and look up policies. The thesis presents a simulation model to
evaluate the performance of the two security solutions using MATLAB.
The present work is done for different values for number of traffic
flows (including changing population of users and users flow size) as well as
different values for the cluster size.
The obtained Results show the effect of these values on gateway
forwarding rate, router forwarding rate, number of gateway managed
security association, group setup rate, key request rate and rekeying rate.
Also the computational cost and storage cost for rekeying with and
without dynamic rekeying (during the changing of the height and degree of
the key tree for dynamic rekeying) will be calculated for the same used
values of the population of user and the user flow size.