Abstract
The coming age is information age in which data is being transmitted from network source to destination using unicast and multicast. Multicast services are very popular for transmission of huge information. Therefore, multicast network are growing day by day and it faces various problems such as reliability, security, congestion, connectivity scalability, fairness etc., due to exponential increment of network. Multicast Congestion is very serious problem to decrease the network utilization if network is not secure then condition may be worst and it is difficult to handle the situation. In this paper, we are providing secure multicast congestion control mechanism. In this mechanism global and local approach is proposed which provide the secure information in presence of congestion at minimum or any cost.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Yin, D.S., Liu, Y.H., et al.: A new TCPfriendly congestion control protocol for layered multicast. In: Proc. IASTED Conference on Internet and Multimedia Systems and Applications, Innsbruck, Austria (February 2006)
Byers, J., Frumin, M., et al.: FLID-DL: congestion control for layered multicast. In: Proc. NGC 2000, Palo Alto, USA, pp. 71–81 (November 2000)
Kulatunga, Fairhurst: TFMCC Protocol Behaviour in Satellite Multicast with Variable Return Path Delays. IEEE (2006)
McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven layered multicast. In: Proceedings of ACM SIGCOMM, New York, USA, pp. 117–130 (August 1996)
Johansen, S., Kim, A.N., Perkis, A.: Quality Incentive Assisted Congestion Control for Receiver-Driven Multicast. IEEE Communications Society ICC 2007 (2007)
Kammoun, W., Youssef, H.: An adaptive Mechanism for End-to-End Multirate Multicast Congestion Control. In: Proceeding of The Third International Conference on Digital Telecommunications, pp. 88–93 (2008)
Li, B., Liu, J.: Multirate video Multicast over the Internet: An Overview. IEEE Network (January/February 2003)
Bruhadeshwar, B., Kulkarni, S.S.: Balancing Revocation and Storage Trade-offs in Secure Group Communication. IEEE Trans. on Dependable And Secure Computing 8(1), 58–73 (2011)
Rizzo, L.: A TCP-friendly single-rate multicast congestion control scheme. In: Proc. ACM SIGCOMM, Stockholm, Sweden, pp. 17–28 (August 2000)
Floyd, S., Handley, M., Padhye, J., Widmer, J.: Equation based congestion control for unicast applications. In: Proc. ACM SIGCOMM, Stockholm, Sweden, pp. 43–56 (August 2000)
Singh, K., Yadav, R.S.: Efficient Joining and Leaving for Receiver Driven Multicast Congestion Contro. International Journal of Computer Applications 1(26), 110–116 (2010)
Singh, K., Yadav, R.S.: Overview of secure multicast Congestion Control. In: International Conference on Soft Computing and Intelligent Systems (ICSCIS 2007), Jabalpur (December 2007)
McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven Layered Multicast. In: Proceedings of ACM SIGCOMM (August 1996)
Athens/Glyfada, Greece, Replay Attack of Dynamic Rights within an Authorised Domain. In: Proc. of IEEE, Third International Conference on Emerging Security Information, Systems and Technologies (2009)
RFC 4046, Multicast Security (MSEC) Group Key Management Architecture (April 2005)
RFC-3740, The Multicast Group Security Architecture (March 2004)
Mokhtarian, K., Hefeeda, M.: Authentication of Scalable Video Streams With Low Communication Overhead. IEEE Trans. on Multimedia 12(7), 730–742 (2010)
Gorinsky, S., Jain, S., Vin, H., Yongguang: Design of Multicast Protocols Robust Against Inflated Subscription. IEEE/ACM Transactions on Networking 14(2) (April 2006)
He, J.-X., Xu, G.-C., Fu, X.-D., Zhou, Z.-G.: A Hybrid and Efficient Scheme of Multicast Source Authentication. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE (2007)
Singh, K., Yadav, R.S., Sharma, A.K.: Adaptive Multicast Source Authentication. In: IEEE Proceeding of International Advance Computing Conference, IACC 2009, March 6-7 (2009)
Perrig, et al.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symp. Security and Privacy 2000 (2000)
Singh, K., Yadav, R.S.: Multicast Congestion Control in Adversary Environment. In: IPCSIT, vol. 31. IACSIT Press, Singapore (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Singh, K., Yadav, R.S. (2013). Integrated Approach for Multicast Source Authentication and Congestion Control. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)