Font Size: a A A

Scalable And Secure Ip Multicast Protocols

Posted on:2006-07-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y ChenFull Text:PDF
GTID:1118360212475796Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
To meet the requirements of key projects of the National High Technology Development 863 Program of China on secure IP multicast infrastructure, and to solve the problems of current IP multicast which include poor scalability, security vulnerabilities, unmanageability, complexity of group address management and dependency to specific multicast infrastructure, this dissertation tackles the key problems of multicast user secure management, anti DoS-attack initiated by multicast sources and receivers, multi-source IP multicast across the domain, anti self-beneficial attack in layered multicast and improvement of PIM-SM and its implementation.Based on the evaluation parameters summarized by this dissertation, the protocols related to current IP multicast models are evaluated. The limitations and deficiencies of the current protocols are summarized. Aiming at the heavy workload of router, an optimized multicast user secure management protocol is put forward. To avoid the malicious hosts from receiving the multicast traffic and to prevent DoS attacks from source and receiver, a secure source specific multicast based on channel hopping is presented. A new lightweight self-configurable closed multi-source IP Multicast protocol for the Internet is proposed. It provides a novel model and protocol for scalable secure across-domain IP multicast. Aiming at the self-beneficial attack problem in layered multicast protocol, a secure layered multicast protocol is presented. The congestion state related access control algorithm is designed. To solve the packet-loss problem when switching from RPT to SPT in PIM-SM protocol, an improved protocol for PIM-SM is put forward. Aiming at implementing completely self-made, 10G line-rate multicast forwarding engine, an efficient distributed design and implementation of PIM-SM is put forward.The simulation, comparison and analysis results show that the protocols and schemes proposed by this thesis are simple, feasible and easy to be implemented, and they also have preferable features in scalability, security, stage-by-stage deployment, and group address management.
Keywords/Search Tags:computer network, multicast, group membership management, routing, security, scalability, protocol design
PDF Full Text Request
Related items