Issues in Multicast Security
نویسندگان
چکیده
Extended Abstract Multicast communications have generated increasing interest during the past few years. This is due, in principle, to the obvious potential for improvement in the use of network resources: data is sent to a number of diierent recipients in just one transmission, instead of requiring the setup and the maintenance of distinct unicast connections. This means substantial savings both in terms of network load and in terms of server operation. However, multicast communications are generally more complicated and cause a number of diicult problems at diierent levels. In particular, the lack of multicast support in most Internet routers has made related technologies largely unavailable. Today, the widespread use of multicast-enabled applications and networks is possible and even likely. The reasons for this are twofold. has pushed the technology by demonstranting that, although many problems remain to be solved, the technology is mature and suucient for supporting high quality applications. The MBONE is overlayed to the standard Internet by tunneling multicast communications via IP unicast, and having routers at each end of the tunnel support multicast routing. Although this was initially done with normal workstations, the main commercial routers are now supporting this function. On the other hand, the technology is being pulled by changes in the size of the Internet and in the way people use it. Some Web sites report receiving millions of requests each day: this means tremendous duplication of data being trasmitted over the same physical media, and sometimes leads to the denial of service that follows excessive load at the server. This is aggravated by the constant increase in multimedia content: images and animations of diierent kinds populate most Web pages, and this is more true for the most popular 1
منابع مشابه
An Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملIP multicast security: Issues and directions
Security represents one of the major obstacles today to the wider deployment of IP mul-ticast. The current work identiies and discusses the various concepts and issues underlying multicast security. A classiication of the current issues is provided, covering some core problems , infrastructure problems, and the complex applications that may be built atop a secure IP multicast. Three broad core ...
متن کاملA Survey of Multicast Security Issues and Architectures
This paper addresses issues relevant to implementing security for IP multicast networks. These issues are of importance to application developers wishing to implement security services for their multicast applications. The paper investigates the steps required to create a secure multicast session including issues of group membership and key distribution. A common simple criteria is established ...
متن کاملSecurity and Reliable Multicast Transport Protocols: Discussions and Guidelines
This document describes general security considerations for the Reliable Multicast Transport (RMT) Working Group set of building blocks and protocols. An emphasis is placed on risks that might be resolved in the scope of transport protocol design. However, relevant security issues related to IP Multicast control-plane and other concerns not strictly within the scope of reliable transport protoc...
متن کاملMulticast Routing Protocol (puma) Security Issues in Mobile Ad Hoc Networks
Security in multicast routing in Mobile Ad Hoc Networks (MANET) is crucial in order to enable effective and efficient multicast based group communication. The security issues of MANET’s in group communications is more challenging due to presence of multiple senders and multiple receivers. In this paper, we analyze the vulnerabilities in a mesh based multicast routing protocol, PUMA (Protocol fo...
متن کامل