KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Securing Group Management in IPv6 with Cryptographically Generated Addresses
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Router-Assistance for Receiver Access Control in PIM-SM
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Scalable sender access control for bi-directional multicast routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Framework to Add AAA Functionalities in IP Multicast
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
An Architecture for Secure and Accountable Multicasting
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
IEEE Communications Surveys & Tutorials
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we present an access control scheme for PIM-SM multicast domain. In order to avoid the overhead of digital signature algorithm, the proposed solution makes use of the Rendezvous Point to collect keys and implement a distributed shared-key based multicast access control system. As it supplies efficient host access control in PIM-SM domain, we name this scheme PIMac. Compared with the existing multicast admission control solutions, PIMac has following advantages: (1) support both receiver and sender access control; (2) realize host exclusion based on expire time; (3) compatibility with current PIM-SM protocol; (4) lower join latency; (5) anti-replay and DoS robustness; last but not least, (6) PIMac architecture is divided into two separated domains: AAA domain and multicast routing domain, entities in each domain do not rely on PKI interoperability or common secret to authenticate each other. The experimental results show that PIMac achieves flexible manageability and improves the performance of multicast access control systems effectively.