SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multicast for multimedia collaborative applications: services and mechanisms
International Journal of Advanced Media and Communication
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Multicast receiver access control by IGMP-AC
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Systems and Software
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Implementation of an IPv6 multicast firewall testbed
Computer Communications
Dr. multicast: Rx for data center communication scalability
Proceedings of the 5th European conference on Computer systems
Tracing illegal users of video: reconsideration of tree-specific and endbuyer-specific methods
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
PIMac: Multicast Access Control Implementation in PIM-SM
Wireless Personal Communications: An International Journal
Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency
IEEE Communications Letters
Secure collaborative cloud design for global USN services
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
A secure PIM-SM multicast routing protocol
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Video fingerprinting system using wavelet and error correcting code
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A viable system for tracing illegal users of video
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Scaling IP multicast on datacenter topologies
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Hi-index | 0.00 |
Multicast enables efficient large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communication. The very properties that make multicast attractive, however, also make it a challenging environment in which to provide content security. We show how the fundamental properties of the multicast paradigm cause security issues and vulnerabilities. We focus on four areas of research in security for multicast content distribution: receiver access control, group key management, multicast source authentication, and multicast fingerprinting. For each we explain the vulnerabilities, discuss the objectives of solutions, and survey work in the area. Also, we briefly highlight other security issues in multicast content distribution including source access control, secure multicast routing, and group policy specification. We then outline several future research directions.