Friday, July 15, 2005

First Progress Report

The group has already decided (with the advice of the thesis adviser) to prioritize the creation of encryption mechanisms (as compared to the authentication and replay subsystems). However, before we can begin on any coding (whether on Java, C, C++, or Visual C++), we need to be thoroughly familiar with the technologies and principles we will be working on. Thus, we are in the midst of reviewing related literature, and the following papers have already been read (brackets indicate the team member assigned to the paper):

  1. “Secure Multicast in Wireless Networks and Mobile Hosts”, Bruschi and Rosti [Lucero]
  2. “Security Protocols for 2G and 3G Wireless Communications”, Newe and Coffey [Lucero]
  3. “Secure Scalable Streaming Enabling Transcoding Without Decryption”, Wee and Apostolopoulos [Roque]
  4. “Securing Media for Adaptive Streaming”, Venkatramani et al [Roque]
  5. “The Secure Real-time Transport Protocol (SRTP) – RFC 3711”, Cisco Systems and Ericsson Research [Kimpo]
  6. “Network Security” (Chapter 8 of Computer Networks 4th Ed.), Tanenbaum [Kimpo]

We have also bookmarked essential pages on ciphers [Roque], IEEE MPEG papers [Lucero], and SpringerLink researches [Lucero]. However, we are having a problem accessing the full versions of some of the papers as we do not have the necessary accounts to open them.

Allow us to mention in passing that we have been able to set-up our PC at the thesis laboratory, and have installed the operating system.

In queue for our ongoing literature review are the following:

  1. “On the Use of Destination Set Grouping to Improve Fairness in Multicast Video Distribution,” Cheung et al [Roque]
  2. “A Software-Optimized Encryption Algorithm”, Rogaway and Coppersmith [Roque]
  3. “Secure Scalable Video Streaming for Wireless Networks”, Wee and Apostolopoulos [Roque]
  4. “A Fast MPEG Video Encryption Algorithm”, Shi and Bhargava [Kimpo]
  5. “On the Performance of Group Key Agreement Protocols”, Amir et al [Kimpo]
  6. “A Survey of Key Management for Secure Group Communication”, Rafaeli and Hutchison [Kimpo]

0 Comments:

Post a Comment

<< Home