Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Role-Based Access Control Models
Computer
Multicast operation of the ad-hoc on-demand distance vector routing protocol
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Enabling conferencing applications on the internet using an overlay muilticast architecture
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Scalable IP Multicast Sender Access Control for Bi-directional Trees
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Router-Assistance for Receiver Access Control in PIM-SM
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
ALMI: an application level multicast infrastructure
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
OMNI: An efficient overlay multicast infrastructure for real-time applications
Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications
Short Survey: A survey of application level multicast techniques
Computer Communications
Hi-index | 0.00 |
In multicast communications, where service providers distribute sensitive information such as military operations information, an important issue is to control operation participants' access to transmitted data and network resources. This issue becomes more complicated when multicast communications take place in mobile ad hoc network (MANET) environments. In this study, we discuss the multicast security issues in MANET and propose a new approach for securing the communications under these conditions. Specifically, we determine the security requirements based on certain use case scenarios and define access control policies in mobile ad hoc multicast communications accordingly. The goal is to create a new protocol for multicast data dissemination while enforcing the required data access policies. The protocol that we propose is based on the multicast features of the well-known Ad hoc On-Demand Distance Vector Routing (MAODV) protocol and incorporates the features of the role-based access control model. The study shows that our approach is simple, but yet flexible and effective in controlling the access to data being transmitted within the multicast groups.