Abstract

In multicast communication , a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable. This allows the set of receivers to be arbitrarily large. A large set of receivers (leaves) poses scalability problems when the multicast source (root) needs to collect data from the receivers. The literature on this subject is rather scarce. For a reverse multicast communication system to be scalable, it is necessary that intermediate multicast routers in the tree collect messages from their child nodes, aggregate them and send them back to their parent node . In this way, the root finally obtains a single message containing all data. Scalability also requires that aggregation of messages does not result in a size growth of the aggregated message. We focus on this problem with the extra requirements that leaf-to-root traffic should stay confidential and authentic. The few existing solutions satisfying all these requirements are such that, for a tree with n leaves, messages have an O( n ) constant length. Therefore, such proposals are only practical for moderate values of n . We propose here a new protocol offering confidentiality, integrity and authentication that is more efficient than previous literature when communication is biased, i.e., when the probabilities of sending ‘1’ or ‘0’ are clearly different. Messages have an O ( k log k log n ) constant length, where k is an upper bound on the number of leaves transmitting the least probable bit in a certain time slot.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call