欢迎来到天天文库
浏览记录
ID:50604960
大小:662.50 KB
页数:38页
时间:2020-03-07
《电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展.doc》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、MulticastreceiveraccesscontrolbyIGMP-AC OriginalResearchArticleComputerNetworksIPmulticastisbest-knownforitsbandwidthconservationandlowerresourceutilization.ThepresentservicemodelofmulticastmakesitdifficulttorestrictaccesstoauthorizedEndUsers(EUs)orpayingcustomers.Withoutaneffectivere
2、ceiveraccesscontrol,anadversarymayexploittheexistingIPmulticastmodel,whereahostorEUcanjoinanymulticastgroupbysendinganInternetGroupManagementProtocol(IGMP)joinmessagewithoutpriorauthenticationandauthorization.Wehavedevelopedanovel,scalableandsecuredaccesscontrolarchitectureforIPmultica
3、stthatdeploysAuthenticationAuthorizationandAccounting(AAA)protocolstocontrolgroupmembership.Theprincipalfeatureoftheaccesscontrolarchitecture,receiveraccesscontrol,isaddressedin38/38thispaper.TheEUorhostinformsthemulticastAccessRouter(AR)ofitsinterestinreceivingmulticasttrafficusingthe
4、IGMPprotocol.WeproposethenecessaryextensionsofIGMPv3tocarryAAAinformation,calledIGMPwithAccessControl(IGMP-AC).ForEUauthentication,IGMP-ACencapsulatesExtensibleAuthenticationProtocol(EAP)packets.EAPisanauthenticationframeworktoprovidesomecommonfunctionsandanegotiationofthedesiredauthen
5、ticationmechanism.Thus,IGMP-ACcansupportavarietyofauthenticationsbyencapsulatingdifferentEAPmethods.Furthermore,wehavemodeledtheIGMP-ACprotocolinPROMELA,andalsoverifiedthemodelusingSPIN.WehaveillustratedtheEAPencapsulationmethodwithanexampleEAPmethod,EAPInternetKeyExchange(EAP-IKEv2).W
6、ehaveusedAVISPAtovalidatethesecuritypropertiesoftheEAP-IKEv2methodinpass-throughmode,whichfitswithintheIGMP-ACarchitecture.Finally,wehaveextendedourpreviously38/38developedaccesscontrolarchitecturetoaccomplishinter-domainreceiveraccesscontrolanddemonstratedtheapplicabilityofIGMP-ACinam
7、ulti-domainenvironment.ArticleOutline1.Introduction2.Backgroundwork2.1.InternetGroupManagementProtocol(IGMP)2.2.AAAprotocols2.3.Accesscontrolarchitecturewithe-commercecommunication2.3.1.Participantaccesscontrol2.3.2.e-Commercecommunication2.3.3.Policyenforcement2.3.4.Limitationofthea
此文档下载收益归作者所有