Learn More
ulticasting is an efficient communication mechanism for group-oriented applications such as video conferencing, interactive group games, and video on demand. IP multicast [1 ] saves bandwidth by sending the source traffic on a multicast tree that spans all the members of the group. In this communication model, groups are identified by a group address, and(More)
The phenomenal growths of group communications and QoS-aware applications over the Internet have respectively accelerated the development of two key technologies , namely , multicasting and Differentiated Services (DiffServ). Although both are complementary technologies , their integration is a non-trivial task due to architectural conflicts between them.(More)
Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the(More)
Even though hierarchical group communication is a prominent communication model for a variety of applications, featured by hierarchical communication rules, it has not been sufficiently investigated in the security literature. In this paper, we introduce private hierarchical group communication and we determine its specific confidentiality requirements, and(More)
IP multicast was initially designed for stationary members and does not consider extra requirements for mobile parties. In fact, to deploy IP multicast, two essential components are required: a membership management protocol to manage the join/leave process, and a routing protocol to build the multicast delivery tree. Currently, multicast membership(More)
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current users. The bandwidth used for such(More)