Skip to main content

Integrated Approach for Multicast Source Authentication and Congestion Control

  • Conference paper
  • 2739 Accesses

Abstract

The coming age is information age in which data is being transmitted from network source to destination using unicast and multicast. Multicast services are very popular for transmission of huge information. Therefore, multicast network are growing day by day and it faces various problems such as reliability, security, congestion, connectivity scalability, fairness etc., due to exponential increment of network. Multicast Congestion is very serious problem to decrease the network utilization if network is not secure then condition may be worst and it is difficult to handle the situation. In this paper, we are providing secure multicast congestion control mechanism. In this mechanism global and local approach is proposed which provide the secure information in presence of congestion at minimum or any cost.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yin, D.S., Liu, Y.H., et al.: A new TCPfriendly congestion control protocol for layered multicast. In: Proc. IASTED Conference on Internet and Multimedia Systems and Applications, Innsbruck, Austria (February 2006)

    Google Scholar 

  2. Byers, J., Frumin, M., et al.: FLID-DL: congestion control for layered multicast. In: Proc. NGC 2000, Palo Alto, USA, pp. 71–81 (November 2000)

    Google Scholar 

  3. Kulatunga, Fairhurst: TFMCC Protocol Behaviour in Satellite Multicast with Variable Return Path Delays. IEEE (2006)

    Google Scholar 

  4. McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven layered multicast. In: Proceedings of ACM SIGCOMM, New York, USA, pp. 117–130 (August 1996)

    Google Scholar 

  5. Johansen, S., Kim, A.N., Perkis, A.: Quality Incentive Assisted Congestion Control for Receiver-Driven Multicast. IEEE Communications Society ICC 2007 (2007)

    Google Scholar 

  6. Kammoun, W., Youssef, H.: An adaptive Mechanism for End-to-End Multirate Multicast Congestion Control. In: Proceeding of The Third International Conference on Digital Telecommunications, pp. 88–93 (2008)

    Google Scholar 

  7. Li, B., Liu, J.: Multirate video Multicast over the Internet: An Overview. IEEE Network (January/February 2003)

    Google Scholar 

  8. Bruhadeshwar, B., Kulkarni, S.S.: Balancing Revocation and Storage Trade-offs in Secure Group Communication. IEEE Trans. on Dependable And Secure Computing 8(1), 58–73 (2011)

    Article  Google Scholar 

  9. Rizzo, L.: A TCP-friendly single-rate multicast congestion control scheme. In: Proc. ACM SIGCOMM, Stockholm, Sweden, pp. 17–28 (August 2000)

    Google Scholar 

  10. Floyd, S., Handley, M., Padhye, J., Widmer, J.: Equation based congestion control for unicast applications. In: Proc. ACM SIGCOMM, Stockholm, Sweden, pp. 43–56 (August 2000)

    Google Scholar 

  11. Singh, K., Yadav, R.S.: Efficient Joining and Leaving for Receiver Driven Multicast Congestion Contro. International Journal of Computer Applications 1(26), 110–116 (2010)

    Article  Google Scholar 

  12. Singh, K., Yadav, R.S.: Overview of secure multicast Congestion Control. In: International Conference on Soft Computing and Intelligent Systems (ICSCIS 2007), Jabalpur (December 2007)

    Google Scholar 

  13. McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven Layered Multicast. In: Proceedings of ACM SIGCOMM (August 1996)

    Google Scholar 

  14. Athens/Glyfada, Greece, Replay Attack of Dynamic Rights within an Authorised Domain. In: Proc. of IEEE, Third International Conference on Emerging Security Information, Systems and Technologies (2009)

    Google Scholar 

  15. RFC 4046, Multicast Security (MSEC) Group Key Management Architecture (April 2005)

    Google Scholar 

  16. RFC-3740, The Multicast Group Security Architecture (March 2004)

    Google Scholar 

  17. Mokhtarian, K., Hefeeda, M.: Authentication of Scalable Video Streams With Low Communication Overhead. IEEE Trans. on Multimedia 12(7), 730–742 (2010)

    Article  Google Scholar 

  18. Gorinsky, S., Jain, S., Vin, H., Yongguang: Design of Multicast Protocols Robust Against Inflated Subscription. IEEE/ACM Transactions on Networking 14(2) (April 2006)

    Google Scholar 

  19. He, J.-X., Xu, G.-C., Fu, X.-D., Zhou, Z.-G.: A Hybrid and Efficient Scheme of Multicast Source Authentication. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE (2007)

    Google Scholar 

  20. Singh, K., Yadav, R.S., Sharma, A.K.: Adaptive Multicast Source Authentication. In: IEEE Proceeding of International Advance Computing Conference, IACC 2009, March 6-7 (2009)

    Google Scholar 

  21. Perrig, et al.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symp. Security and Privacy 2000 (2000)

    Google Scholar 

  22. Singh, K., Yadav, R.S.: Multicast Congestion Control in Adversary Environment. In: IPCSIT, vol. 31. IACSIT Press, Singapore (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Singh, K., Yadav, R.S. (2013). Integrated Approach for Multicast Source Authentication and Congestion Control. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics