Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data origin authentication service as well as a quality adaptation technique for the received stream. Signature propagation and layered multicast are efficient solutions satisfying these two requirements. In this paper we investigate the use of signature propagation to ensure data origin authentication service. We, then, propose a set of novel data origin authentication techniques for layered media-streaming video. In addition to data origin authentication, the proposed techniques offer continuous non-repudiation of the origin and data integrity. These techniques take advantage of the preestablished layered structure of the encoded video data to reduce the overhead and improve the overall verification in lossy network environments. We evaluate the performance of the proposed techniques through extensive simulations using NS2 simulator.
In this paper, we present a new multicast content distribution framework supporting content access control and accounting. MCDA2 (Multicast Content Distribution Architecture with Accounting support) is based on the standard protocols Diameter and MLD (Multicast Listener Discovery). It allows the generation and storage of individual and group accounting information of heterogeneous multicast members. This architecture offers easy integration and good scalability which could allow further multicast deployment.
Abstract-In this paper, we propose an efficient multicast source authentication protocol based on a novel layered hash-chaining scheme. Our protocol tolerates packet loss and guarantees non-repudiation of media-streaming origin. Furthermore, our protocol allows receivers to make the decision regarding the authentication information redundancy degree depending on the quality of reception in term of packet loss ratio. This novel technique allows to save bandwidth since the packet loss distribution over a large scale network is likely to be not uniform. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.