Secure Overlay Multicast Infrastructure for P2P-based IPTV Service

被引:0
|
作者
Kwon, Hyeokchan [1 ]
Kim, Sangchoon [2 ]
Nah, Jaehoon [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon, South Korea
[2] Kangwon Natl Univ, Chunchon, South Korea
来源
11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER! | 2009年
关键词
Overlay multicast; Security; Peer-to-Peer; IPTV; Media streaming; SCRIBE; Pastry;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, there is the attempt to use P2P-based multicast to distribute streaming media data for reducing network load and management cost. But there exist many security threats about P2P-based overlay multicast mechanism. In this paper we analyze the security vulnerability of P2P-based overlay multicast mechanism, and propose the security solutions against it.
引用
收藏
页码:2041 / 2043
页数:3
相关论文
共 50 条
  • [41] Adaptive Chunk Scheduling Method for P2P-based Multimedia Streaming Service
    Lee, ChangeKyu
    Hyun, Wook
    Kang, ShinGak
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 91 - 94
  • [42] Bring QoS to P2P-based semantic service discovery for the Universal Network
    Zhang, Ying
    Huang, Houkuan
    Yang, Dong
    Zhang, Hongke
    Chao, Han-Chieh
    Huang, Yueh-Min
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (07) : 471 - 477
  • [43] A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services
    Wei, Tsao-Ta
    Wang, Chia-Hui
    Chu, Yu-Hsien
    Chang, Ray-, I
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2012, 2012
  • [44] Improving resiliency using capacity-aware multicast tree in P2P-based streaming environments
    Kim, Eunseok
    Jang, Jiyong
    Park, Sungyoung
    Sussman, Alan
    Yoo, Jae Soo
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 925 - 934
  • [45] Secure content exchange method for P2P-based content delivery using Byzantine algorithm
    Maeda, Mikio
    Sunaga, Hiroshi
    Nakamura, Hiroyuki
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2006, : 371 - 376
  • [46] P2P-Based Single Sign-On
    Ma, Yong
    Chen, Xuewen
    Li, Ling
    Luo, Yaoming
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 845 - +
  • [47] Technical trends in P2P-based communications
    Sunaga, H
    Hoshiai, T
    Kamei, S
    Kimura, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 2831 - 2846
  • [48] QoS-aware service selection in P2P-based business process frameworks
    Yuan, Shuai
    Shen, Jun
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 675 - +
  • [49] Adaptive Fragmentation Method using Fragments Bundling for P2P-based Streaming Service
    Hyun, Wook
    Kim, SungHei
    Lee, ChanKyu
    Kang, ShinGak
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 409 - 411
  • [50] Research of P2P-based route technology
    School of Computer Engineering and Sciences, Shanghai University, Shanghai 200072, China
    Jisuanji Gongcheng, 2006, 6 (134-136):