A secure multicast protocol for the internet's multicast backbone

نویسندگان

  • Wen-Her Yang
  • Kai-Wei Fan
  • Shiuh-Pyng Shieh
چکیده

I n recent years, the Internet has seen an increase in the number of new applications that rely on multicast transmission. Multicast is a technology that conserves bandwidth in point-to-multipoint transmission. With the development of Mbone technology, an Internet-wide virtual network for point-to-multipoint transmission, group communication becomes possible NetMeeting, NetShow and many other applications for group communications are available on the Internet. The Internet’s Multicast Backbone (Mbone) is the small subset of Internet routers and hosts that are interconnected and are capable of forwarding IP multicast traffic. The MBone constructs a virtual network that is divided into sub-networks called islands. The islands are connected by multicastcapable routers via virtual point-to-point links called ‘tunnels’. The tunnels enable multicast traffic to pass through the non-multicast-capable parts of the Internet. Multicast packets sent to a local island are captured by a local Multicast router (MRouter), then the MRouter encapsulates these packets in IPover-IP format and unicasts to other MRouters in remote islands via tunnels. The remote MRouters then strip the encapsulated packets and multicast to their local islands. Since the Internet is an open environment, multicast messages may be eavesdropped easily. In order to prevent intruders from cracking group communications, a secure multicast environment must be provided. Confidential data have to be encrypted before transmission and only legal group members can acquire communication contents. The basic requirement is that all group members need to know the common group key that is used to encrypt communication data. Then the main problem is how to distribute secret information or a common key to the members distributed across the Internet and a secure key-establishment process is required. Key-establishment schemes can be classified into two categories: one is key agreement and the other is key distribution. Key agreement allows all members to determine the common key securely and collaboratively. The Diffie–Hellman key exchange1 is an example of key agreement techniques for two parties. Key distribution is simpler, it only needs someone to select the common key and securely distribute it to others. There are two kinds of key distribution: centralized and decentralized. Centralized schemes usually

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Long-Term Analysis of Growth and Usage Patterns in the Multicast Backbone (MBone)

The Multicast Backbone (MBone), the Internet's multicast research infrastructure, has existed since the early 1990s. Since its inception, there have been few formal studies investigating the “state of multicast”, i.e. the success of multicast deployment. Our work attempts to understand (1) how the MBone is used, (2) how multicast deployment has progressed, and (3) what barriers exist for the co...

متن کامل

Multicast Group Behavior in the Internet's Multicast Backbone (mbone)

The Multicast Backbone (MBone) is a network overlaying the global Internet designed to support multipoint applications. In this paper, we rst give an overview of the development and architecture of the current MBone. One important characteristic of the MBone is its reliance on IP multicast which allows receivers to join and leave groups asynchronously. We describe The Mlisten data collection to...

متن کامل

Multicast computer network routing using genetic algorithm and ant colony

Due to the growth and development of computer networks, the importance of the routing topic has been increased. The importance of the use of multicast networks is not negligible nowadays. Many of multimedia programs need to use a communication link to send a packet from a sender to several receivers. To support such programs, there is a need to make an optimal multicast tree to indicate the opt...

متن کامل

BEAM: a distributed aggregated multicast protocol using bi-directional trees

IP multicast confronts a severe scalability problem when there are large numbers of multicast groups in the network due to state explosion and control explosion. In backbone networks, this state scalability problem is exacerbated, since there are potentially enormous multicast groups crossing backbone domains. To improve the state scalability of multicast in backbone domains, in this paper, we ...

متن کامل

The Multicast Dissemination Protocol (mdp) Toolkit

The Multicast Dissemination Protocol (MDP) provides reliable multicast file and data delivery on top of the generic UDP/IP multicast transport. Early work on MDP was deployed across the global Internet Multicast Backbone (Mbone) as part of the publicly available Image Multicaster (IMM) application. This paper describes more recent work on MDP resulting in the MDP version 2 (MDPv2) toolkit. This...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. Journal of Network Management

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2001