Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We propose two new schemes to detect malicious peers in overlay multicast streaming. These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious. Results from our simulations indicate that the proposed schemes can detect malicious peers with medium to high accuracy, depending on cheating patterns and malicious peer percentages.
Abstract-In this paper, we consider the problem of providing fault tolerant operation for multicast networks with multiple sources, e.g., sensors, and delivering data to a pre-defined set of destinations, e.g., sinks. We propose an algorithm that combines network and erasure coding to provide resilience against a predefined number of link failures. For sources unable to meet the flow constraints, support is provided at the cost of reduced throughput and if required, reduced protection. The necessary and sufficient flow conditions for network resource verification are proved. We also prove that the field size for coding coefficients is bounded by the amount of protection offered for erasure coding, and equal to 2 for network coding.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.