Multicast receiver access control by IGMP-AC

نویسندگان

  • Salekul Islam
  • J. William Atwood
چکیده

IP multicast is best-known for its bandwidth conservation and lower resource utilization. The present service model of multicast makes it difficult to restrict access to authorized End Users (EUs) or paying customers. Without an effective receiver access control, an adversary may exploit the existing IP multicast model, where a host or EU can join any multicast group by sending an Internet Group Management Protocol (IGMP) join message without prior authentication and authorization. We have developed a novel, scalable and secured access control architecture for IP multicast that deploys Authentication Authorization and Accounting (AAA) protocols to control group membership. The principal feature of the access control architecture, receiver access control, is addressed in this paper. The EU or host informs the multicast Access Router (AR) of its interest in receiving multicast traffic using the IGMP protocol. We propose the necessary extensions of IGMPv3 to carry AAA information, called IGMP with Access Control (IGMPAC). For EU authentication, IGMP-AC encapsulates Extensible Authentication Protocol (EAP) packets. EAP is an authentication framework to provide some common functions and a negotiation of the desired authentication mechanism. Thus, IGMP-AC can support a variety of authentications by encapsulating different EAP methods. Furthermore, we have modeled the IGMP-AC protocol in PROMELA, and also verified the model using SPIN. We have illustrated the EAP encapsulation method with an example EAP method, EAP Internet Key Exchange (EAP-IKEv2). We have used AVISPA to validate the security properties of the EAP-IKEv2 method in pass-through mode, which fits within the IGMP-AC architecture. Finally, we have extended our previously developed access control architecture to accomplish inter-domain receiver access control and demonstrated the applicability of IGMP-AC in a multi-domain environment. 2008 Elsevier B.V. All rights reserved. . All rights reserved. ion and Accounting;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The necessity of multicast for IPTV streaming

The IPTV channels require high bandwidth for high clear television programs.. The use of multicast for IPTV service is considered necessary to resolve such problem. IP multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering single stream of data to thousand costumers. Applications that take advantage of multicast include IPTV services, distance learning,...

متن کامل

An Extended IGMP Protocol for Mobile IPTV Services in Mobile WiMAX

Mobile WiMAX access network is being developed to support various multimedia services such as mobile Internet Protocol Television (IPTV), mobile Video-on-Demand (VoD), and mobile Internet services. This mobile network is a shared radio medium which utilizes a point-to-multipoint method, where one base station (BS) can be connected to many mobile stations (MS). This environment enables mobile IP...

متن کامل

Fast group management in IGMP

The ability to control quickly the expansion/reduction of the multicast distribution tree is central in some recent proposals for multicast congestion control. At the lowest level, these operations are controlled by the IGMP protocol. With the current speciication of the protocol, IGMP takes a few seconds to stop distribution of a group after a request. This reduces the eeectiveness of congesti...

متن کامل

A Reliable Subcasting Protocol for Wireless Environments

This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these smaller regions is applied using a tree of retransmission servers (RSs). RM2 is receiver oriented [1] in that the transmitter does not need to know its receivers, hence offering better scalability. The Internet Group...

متن کامل

Gothic: A Group Access Control Architecture for Secure Multicast and Anycast

Multicast and anycast have received considerable attention due to their ability to support networked services. There are distinct and significant security vulnerabilities in both the multicast and anycast model including denial of service, theft of service, eavesdropping, and masquerading. The multicast problem requires a secure IGMP. The anycast problem requires secure anycast server advertise...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 53  شماره 

صفحات  -

تاریخ انتشار 2009