32nd IEEE Conference on Local Computer Networks (LCN 2007) 2007
DOI: 10.1109/lcn.2007.53
|View full text |Cite
|
Sign up to set email alerts
|

Sender Access Control in IP Multicast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2011
2011

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…It is basically composed of a sender access control [10] to implement the first rule (only legitimate senders can send) and a receiver access control [11] to implement the second one (only valid customers can receive). However, in insecure classical architecture of IP multicast "everyone can send; only valid customers can receive" due to lack of sender access control [10]. That is, the insecure classical architecture of IP multicast, allows any user to send data to a multicast group without a prior join to that group.…”
Section: Secure Ip Multicast With Double-sided Access Controlmentioning
confidence: 99%
“…It is basically composed of a sender access control [10] to implement the first rule (only legitimate senders can send) and a receiver access control [11] to implement the second one (only valid customers can receive). However, in insecure classical architecture of IP multicast "everyone can send; only valid customers can receive" due to lack of sender access control [10]. That is, the insecure classical architecture of IP multicast, allows any user to send data to a multicast group without a prior join to that group.…”
Section: Secure Ip Multicast With Double-sided Access Controlmentioning
confidence: 99%
“…IP Multicast would be an ideal solution to the problem of sending homogeneous notifications to multiple destinations, but IP Multicast has not yet been widely adopted [1]. IMS presence requires communication between RLSs in home networks controlled by multiple service providers, so wide support for IP Multicast would be required in routers between these RLSs.…”
Section: Related Workmentioning
confidence: 99%
“…These updates are normally sent out directly to a set of destinations that have subscribed to receive these updates; however, this method causes a number of identical messages to be sent across network links close to the source of the notifying node. IP Multicast could reduce message replication but to date it is not widely deployed [1]. Instead, this paper presents an application-layer multicast approach that uses a tree-based distribution of notifications, with network coordinates guiding the set up of the distribution tree.…”
Section: Introductionmentioning
confidence: 99%
“…A simple admission scheme is proposed in Reference [32] as a complement to multicast listener discovery (MLD) [33]: Prior to data dissemination, a new source issues an empty packet to the multicast group, which triggers an admission procedure between the access router and an authentication, authorization and accounting (AAA) server. In a mobile regime, such AAA third party admission will be required on each handover, thus placing a significant signaling burden as well as delay onto mobile multicast protocols.…”
Section: Related Work On Multicast Sender Authenticationmentioning
confidence: 99%