Multicast receiver access control by IGMP-AC
نویسندگان
چکیده
IP multicast is best-known for its bandwidth conservation and lower resource utilization. The present service model of multicast makes it difficult to restrict access to authorized End Users (EUs) or paying customers. Without an effective receiver access control, an adversary may exploit the existing IP multicast model, where a host or EU can join any multicast group by sending an Internet Group Management Protocol (IGMP) join message without prior authentication and authorization. We have developed a novel, scalable and secured access control architecture for IP multicast that deploys Authentication Authorization and Accounting (AAA) protocols to control group membership. The principal feature of the access control architecture, receiver access control, is addressed in this paper. The EU or host informs the multicast Access Router (AR) of its interest in receiving multicast traffic using the IGMP protocol. We propose the necessary extensions of IGMPv3 to carry AAA information, called IGMP with Access Control (IGMPAC). For EU authentication, IGMP-AC encapsulates Extensible Authentication Protocol (EAP) packets. EAP is an authentication framework to provide some common functions and a negotiation of the desired authentication mechanism. Thus, IGMP-AC can support a variety of authentications by encapsulating different EAP methods. Furthermore, we have modeled the IGMP-AC protocol in PROMELA, and also verified the model using SPIN. We have illustrated the EAP encapsulation method with an example EAP method, EAP Internet Key Exchange (EAP-IKEv2). We have used AVISPA to validate the security properties of the EAP-IKEv2 method in pass-through mode, which fits within the IGMP-AC architecture. Finally, we have extended our previously developed access control architecture to accomplish inter-domain receiver access control and demonstrated the applicability of IGMP-AC in a multi-domain environment. 2008 Elsevier B.V. All rights reserved. . All rights reserved. ion and Accounting;
منابع مشابه
The necessity of multicast for IPTV streaming
The IPTV channels require high bandwidth for high clear television programs.. The use of multicast for IPTV service is considered necessary to resolve such problem. IP multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering single stream of data to thousand costumers. Applications that take advantage of multicast include IPTV services, distance learning,...
متن کاملAn Extended IGMP Protocol for Mobile IPTV Services in Mobile WiMAX
Mobile WiMAX access network is being developed to support various multimedia services such as mobile Internet Protocol Television (IPTV), mobile Video-on-Demand (VoD), and mobile Internet services. This mobile network is a shared radio medium which utilizes a point-to-multipoint method, where one base station (BS) can be connected to many mobile stations (MS). This environment enables mobile IP...
متن کاملFast group management in IGMP
The ability to control quickly the expansion/reduction of the multicast distribution tree is central in some recent proposals for multicast congestion control. At the lowest level, these operations are controlled by the IGMP protocol. With the current speciication of the protocol, IGMP takes a few seconds to stop distribution of a group after a request. This reduces the eeectiveness of congesti...
متن کاملA Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these smaller regions is applied using a tree of retransmission servers (RSs). RM2 is receiver oriented [1] in that the transmitter does not need to know its receivers, hence offering better scalability. The Internet Group...
متن کاملGothic: A Group Access Control Architecture for Secure Multicast and Anycast
Multicast and anycast have received considerable attention due to their ability to support networked services. There are distinct and significant security vulnerabilities in both the multicast and anycast model including denial of service, theft of service, eavesdropping, and masquerading. The multicast problem requires a secure IGMP. The anycast problem requires secure anycast server advertise...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 53 شماره
صفحات -
تاریخ انتشار 2009