欢迎来到天天文库
浏览记录
ID:41005114
大小:485.50 KB
页数:17页
时间:2019-08-13
《电信与移动互联网行业 市场 企业 产品应用及无线网民的》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、MulticastreceiveraccesscontrolbyIGMP-AC OriginalResearchArticleComputerNetworksIPmulticastisbest-knownforitsbandwidthconservationandlowerresourceutilization.ThepresentservicemodelofmulticastmakesitdifficulttorestrictaccesstoauthorizedEndUsers(EUs)orpayingcustomers.Withoutanef
2、fectivereceiveraccesscontrol,anadversarymayexploittheexistingIPmulticastmodel,whereahostorEUcanjoinanymulticastgroupbysendinganInternetGroupManagementProtocol(IGMP)joinmessagewithoutpriorauthenticationandauthorization.Wehavedevelopedanovel,scalableandsecuredaccesscontrolarchit
3、ectureforIPmulticastthatdeploysAuthenticationAuthorizationandAccounting(AAA)protocolstocontrolgroupmembership.Theprincipalfeatureoftheaccesscontrolarchitecture,receiveraccesscontrol,isaddressedinthispaper.TheEUorhostinformsthemulticastAccessRouter(AR)ofitsinterestinreceivingmu
4、lticasttrafficusingtheIGMPprotocol.WeproposethenecessaryextensionsofIGMPv3tocarryAAAinformation,calledIGMPwithAccessControl(IGMP-AC).ForEUauthentication,IGMP-ACencapsulatesExtensibleAuthenticationProtocol(EAP)packets.EAPisanauthenticationframeworktoprovidesomecommonfunctionsan
5、danegotiationofthedesiredauthenticationmechanism.Thus,IGMP-ACcansupportavarietyofauthenticationsbyencapsulatingdifferentEAPmethods.Furthermore,wehavemodeledtheIGMP-ACprotocolinPROMELA,andalsoverifiedthemodelusingSPIN.WehaveillustratedtheEAPencapsulationmethodwithanexampleEAPme
6、thod,EAPInternetKeyExchange(EAP-IKEv2).WehaveusedAVISPAtovalidatethesecuritypropertiesoftheEAP-IKEv2methodinpass-throughmode,whichfitswithintheIGMP-ACarchitecture.Finally,wehaveextendedourpreviouslydevelopedaccesscontrolarchitecturetoaccomplishinter-domainreceiveraccesscontrol
7、anddemonstratedtheapplicabilityofIGMP-ACinamulti-domainenvironment.ArticleOutline1.Introduction2.Backgroundwork2.1.InternetGroupManagementProtocol(IGMP)2.2.AAAprotocols2.3.Accesscontrolarchitecturewithe-commercecommunication2.3.1.Participantaccesscontrol2.3.2.e-Commercecommuni
8、cation2.3.3.Policyenforcement2.3.4.Limitationofthearchitectur
此文档下载收益归作者所有