Abstract
Currently, multicast services can be implemented at the IP layer or the application layer. While IP multicast violates the stateless paradigm of Internet and incurs great difficulties to congestion and flow control, application-layer multicast is lack of scalability due to the unreliability and resource constraints of end-hosts. Moreover, security is a main weakness in Internet-wide group communications. We propose in this paper a novel architecture for secure and scalable multicast in the Internet. In our architecture, a Multicast Agent in each Autonomous System (AS) is responsible for delivering multicast packets at the AS-level, relaying packets to end-hosts, and generating and updating keys to secure group communications. The proposed membership management protocol enables no-delay to membership updating; the proposed inter-domain routing protocol reduces the worst-case link stress by one magnitude compared to state-of-the-art protocols, and bounds the extra bandwidth cost within one percent compared to traditional IP multicast.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rules for Delivery of CM Alerts to the Public During Emergencies (April 2008), http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-08-99A1.pdf
Routing Information Service (October 2007), http://www.ripe.net/projects/ris/index.html
Adams, A., Nicholas, J., Siadak, W.: Protocol Independent Multicast - Dense Mode (PIM-DM) Protocol specification (Revised). Internet Draft (October 2003)
Ballardie, T., Francis, P., Crowcroft, J.: Core based trees (CBT) an architecture for scalable inter-domain multicast routing. Technical report, San Francisco, CA (September 1993)
Banerjee, S., Bhattacharjee, B., Kommareddy, C.: Scalable application layer multicast. In: Proceedings of ACM SIGCOMM (September 2002)
Banerjee, S., Kommareddy, C., Kar, K., Bhattacharjee, B., Khuller, S.: Construction of an efficient overlay multicast infrastructure for real-time applications. In: Proceedings of IEEE INFOCOM (April 2003)
Chawathe, Y.: Scattercast: An Architecture for Internet Broadcast Distribution as an Infrastructure Service, Ph.D. Thesis, University of California, Berkeley (December 2000)
Chu, Y., Rao, S.G., Zhang, H.: A case for end system multicast. In: Proceedings of ACM SIGMETRICS (June 2000)
Deering, S., Cheriton, D.: Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems 8(2), 85–110 (1990)
Fenner, B., Handley, M., Holbrook, H., Kouvelas, I.: Protocol Independent Multicast sparse mode (PIM-SM): Protocol specification (October 2003); Internet Draft
Francis, P.: Yoid: your own internet distribution (March 2001), http://www.isi.edu/div7/yoid/
Fenner, B., Handley, M., Holbrook, H., Kouvelas, I.: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). Internet Draft (March 2001)
Helder, D.A., Jamin, S.: End-host multicast communication using switch-tree protocols. In: Proceedings of the Workshop on Global and PeertoPeer Computing on Large Scale Distributed Systems (GP2PC) (May 2002)
Jannotti, J., Gifford, D., Johnson, K., Kaashoek, M., OToole, J.: Overcast: reliable multicasting with an overlay network. In: Proceedings of the Symposium on Operating Systems Design and Implementation (October 2000)
Kumar, K., Radolavov, P., Thaler, D., Alaettinoglu, D., Estrin, D., Handley, M.: The MASC/BGMP architecture for inter-domain multicast routing. In: Proceedings of SIGCOMM, Vancouver, Canada (September 1998)
Liebeherr, J., Beam, T.: HyperCast: a protocol for maintaining multicast group members in a logical hypercube topology. Networked Group Communication, 72–89 (1999)
Moy, J.: RFC 1585: MOSPF. Analisys and Experience. Proteon Inc. (March 1994)
Mittra, S.: Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM, pp. 277–288 (1997)
Oliveira, R., Lad, M., Zhang, B., Zhang, L.: Geographically Informed Inter-domain Routing. In: Proceeding of IEEE International Conference on Network Protocols (ICNP) (October 2007)
Pendarakis, D., Shi, S., Verma, D., Waldvogel, M.: ALMI: An Application Level Multicast Infrastructure. In: Proceedings of 3rd Usenix Symposium on Internet Technologies & Systems (USITS) (March 2001)
Ratnasamy, S., Ermolinskiy, A., Shenker, S.: Revisiting IP Multicast. In: Proceeding of SIGCOMM 2006, Pisa, Italy, September 2006, pp. 11–15 (2006)
Shi, S., Turner, J.: Routing in overlay multicast networks. In: Proceedings of IEEE INFOCOM (June 2002)
Subramanian, L., Agarwal, S., Rexford, J., Katz, R.H.: Characterizing the Internet Hierarchy from Multiple Vantage Points. In: Proceedings of IEEE INFOCOM (June 2002)
Waitzman, D., Partridge, C., Deering, S.: Distance Vector Multicast Routing Protocol. ARPANETWorking Group Requests for Comment, DDN Network Information Center (November 1988); RFC-1075
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF Request For Comments, RFC 2627 (June 1999)
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: ACM SIGCOMM, pp. 68-79 (1998)
Zhang, B., Jamin, S., Zhang, L.: Universal IP multicast delivery. In: Proceedings of the International Workshop on Networked Group Communication (NGC) (October 2002)
Content Addressable Memory Cypress Semiconductor, http://www.cypress.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wei, Y., Yu, Z., Guan, Y. (2009). A Novel Architecture for Secure and Scalable Multicast over IP Network. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 19. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05284-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-05284-2_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05283-5
Online ISBN: 978-3-642-05284-2
eBook Packages: Computer ScienceComputer Science (R0)