Authenticated Live Integration and Verification Scheme in Hybrid Content Delivery Networks

نویسنده

  • C. Chandrasekar
چکیده

With the increase number of wireless communication environment, content distribution and streaming are became very ease. The Live video streaming over wireless network is very popular nowadays. Due to the popularity of streaming delivery of data contents over wireless networks, the development of live video streaming also has attracted much attention. This technology boosts the distribution of live video contents over CDN (Content Delivery Networks). Due to the tremendous popularity and reliability, the live video streaming suffers from huge security issues such as DOS (Denial of Services), clone attacks other malicious attacks. The proposed system protects the data from the above security issues by using a new prototype named as “ALIVE”. It is a shield for data, which rescues from video crime and other misbehaving activities over CDN and P2P. Alive performs the source and destination authentication while transmitting the video, so this eliminates the entry of spoofer’s and unauthenticated nodes in the network. Alive utilizes an encoding technique named as cryptmask, which performs an encoding technique against copyright forgery attacks. To achieve the above goal, alive incorporated with effective encoding techniques. The experiment has been performed using NS-2 tool.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Live Integration and Verification Scheme in Hybrid Content Delivery Networks

With the increase number of wireless communication environment, content distribution and streaming are became very ease. The Live video streaming over wireless network is very popular nowadays. Due to the popularity of streaming delivery of data contents over wireless networks, the development of live video streaming also has attracted much attention. This technology boosts the distribution of ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Improve Replica Placement in Content Distribution Networks with Hybrid Technique

The increased using of the Internet and its accelerated growth leads to reduced network bandwidth and the capacity of servers; therefore, the quality of Internet services is unacceptable for users while the efficient and effective delivery of content on the web has an important role to play in improving performance. Content distribution networks were introduced to address this issue. Replicatin...

متن کامل

A Threshold Authenticated Encryption Scheme Using Hybrid Problems

In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems. We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Security analysis shows that our scheme will remain secure even if one of these problems can be solved.

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015