Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Design of multicast protocols robust against inflated subscription

Published: 01 April 2006 Publication History

Abstract

To disseminate data to a heterogeneous body of receivers efficiently, congestion control protocols for IP multicast compose a session from several multicast groups and prescribe guidelines that enable each re ceiver to subscribe to an appropriate subset of the groups. However, a misbehaving receiver can ignore the group subscription rules and inflate its subscription to acquire unfairly high throughput. In this paper, we present the first solution for the problem of inflated subscription. Our design guards access to multicast groups with dynamic keys and consists of two independent components: DELTA (Distribution of ELigibility To Access)-a novel method for in-band distribution of group keys to receivers that are eligible to access the groups according to the congestion control protocol, and SIGMA (Secure Internet Group Management Architecture)-a generic architecture for key-based group access at edge routers. We apply DELTA and SIGMA to derive robust versions of prominent RLM and FLID-DL protocols.

References

[1]
{1} M. Allman, V. Paxson, and W. Stevens, TCP Congestion Control, RFC 2581, Apr. 1999.
[2]
{2} A. Ballardie and J. Crowcroft, "Multicast-specific security threats and counter-measures," in Proc. NDSS 1995, Feb. 1995.
[3]
{3} S. Banerjee, B. Bhattacharjee, and C. Kommareddy, "Scalable application layer multicast," in Proc. ACM SIGCOMM, Aug. 2002, pp. 205-217.
[4]
{4} J. W. Byers, G. Horn, M. Luby, M. Mitzenmacher, and W. Shaver, "FLID-DL: congestion control for layered multicast," IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1558-1570, Oct. 2002.
[5]
{5} J. W. Byers, G. Kwon, M. Luby, and M. Mitzenmacher, "Fine-grained layered multicast with STAIR," IEEE/ACM Trans. Netw., vol. 14, no. 1, pp. 81-93, Feb. 2006.
[6]
{6} J. W. Byers, M. Luby, and M. Mitzenmacher, "A digital fountain approach to asynchronous reliable multicast," IEEE J. Sel. Areas Commun., vol. 20, no. 8, pp. 1528-1540, Oct. 2002.
[7]
{7} S. Y. Cheung and M. H. Ammar, "Using destination set grouping to improve the performance of window-controlled multipoint connections," Comput. Commun. J., vol. 19, pp. 723-736, 1996.
[8]
{8} S. Y. Cheung, M. H. Ammar, and X. Li, "On the use of destination set grouping to improve fairness in multicast video distribution," in Proc. IEEE INFOCOM, Mar. 1996, pp. 553-560.
[9]
{9} S. E. Deering, "Multicast routing in a datagram Internetwork," Ph.D. dissertation, Stanford Univ., Stanford, CA, Dec. 1991.
[10]
{10} D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson, "Robust congestion signaling," in Proc. IEEE ICNP, Nov. 2001, pp. 332-341.
[11]
{11} W. Fenner, Internet Group Management Protocol, Version 2, RFC 2236, Nov. 1997.
[12]
{12} S. Gorinsky, S. Jain, and H. Vin, "Multicast congestion control with distrusted receivers," in Proc. Networked Group Communication (NGC), Oct. 2002, pp. 19-26.
[13]
{13} S. Gorinsky, S. Jain, H. Vin, and Y. Zhang, "Robustness to inflated subscription in multicast congestion control," in Proc. ACM SIGCOMM, Aug. 2003, pp. 87-98.
[14]
{14} S. Gorinsky, K. K. Ramakrishnan, and H. Vin, Addressing heterogeneity and scalability in layered multicast congestion control Dept. Comput. Sci., Univ. Texas at Austin, Tech. Rep. TR2000-31, Nov. 2000.
[15]
{15} H. W. Holbrook and D. R. Cheriton, "IP multicast channels: EXPRESS support for large-scale single-source applications," in Proc. ACM SIGCOMM , Sep. 1999, pp. 65-78.
[16]
{16} P. Judge and M. Ammar, "Gothic: a group access control architecture for secure multicast and anycast," in Proc. IEEE INFOCOM, Jun. 2002, pp. 1547-1556.
[17]
{17} A. Legout and E. W. Biersack, "PLM: fast convergence for cumulative layered multicast transmission schemes," in Proc. ACM SIGMETRICS, Jun. 2000, pp. 13-22.
[18]
{18} M. Luby, V. K. Goyal, S. Skaria, and G. B. Horn, "Wave and equation based rate control using multicast round trip time," in Proc. ACM SIGCOMM , Aug. 2002, pp. 191-214.
[19]
{19} R. Mahajan, S. Floyd, and D. Wetherall, "Controlling high-bandwidth flows at the congested router," in Proc. IEEE ICNP, Nov. 2001, pp. 192-201.
[20]
{20} S. McCanne, V. Jacobson, and M. Vetterli, "Receiver-driven layered multicast," in Proc. ACM SIGCOMM, Aug. 1996, pp. 117-130.
[21]
{21} A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 2001.
[22]
{22} S. Mittra, "Iolus: a framework for scalable secure multicasting," in Proc. ACM SIGCOMM, Sep. 1997, pp. 277-288.
[23]
{23} UCB/LBNL/VINT Network Simulator ns-2. May 2004 {Online}. Available: http://www-mash.cs.berkeley.edu/ns
[24]
{24} A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2001, pp. 35-46.
[25]
{25} K. K. Ramakrishnan and S. Floyd, A proposal to add Explicit Congestion Notification (ECN) to IP, RFC 2481, Jan. 1999.
[26]
{26} S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP congestion control with a misbehaving receiver," ACM Comput. Commun. Rev., vol. 29, no. 5, pp. 71-78, Oct. 1999.
[27]
{27} A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
[28]
{28} D. Sisalem and A. Wolisz, "MLDA: a TCP-friendly congestion control framework for heterogeneous multicast environments," in Proc. IWQoS, Jun. 2000, pp. 65-74.
[29]
{29} L. Vicisano, L. Rizzo, and J. Crowcroft, "TCP-like congestion control for layered multicast data transfer," in Proc. IEEE INFOCOM, Mar. 1998, pp. 996-1003.
[30]
{30} M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The versakey framework: versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614-1631, Sep. 1999.

Cited By

View all
  • (2014)Using tuangou to reduce IP transit costsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2013.227823622:5(1415-1428)Online publication date: 1-Oct-2014
  • (2010)Enforcing layered multicast congestion control using ECN-nonceComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.09.01554:3(489-505)Online publication date: 1-Feb-2010
  • (2008)Rd network servicesProceedings of the ACM SIGCOMM 2008 conference on Data communication10.1145/1402958.1402988(255-266)Online publication date: 17-Aug-2008
  • Show More Cited By

Index Terms

  1. Design of multicast protocols robust against inflated subscription

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE/ACM Transactions on Networking
        IEEE/ACM Transactions on Networking  Volume 14, Issue 2
        April 2006
        217 pages

        Publisher

        IEEE Press

        Publication History

        Published: 01 April 2006
        Published in TON Volume 14, Issue 2

        Author Tags

        1. congestion control
        2. fair bandwidth allocation
        3. misbehaving receivers
        4. multicast
        5. robust communication protocols

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2014)Using tuangou to reduce IP transit costsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2013.227823622:5(1415-1428)Online publication date: 1-Oct-2014
        • (2010)Enforcing layered multicast congestion control using ECN-nonceComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.09.01554:3(489-505)Online publication date: 1-Feb-2010
        • (2008)Rd network servicesProceedings of the ACM SIGCOMM 2008 conference on Data communication10.1145/1402958.1402988(255-266)Online publication date: 17-Aug-2008
        • (2008)Rd network servicesACM SIGCOMM Computer Communication Review10.1145/1402946.140298838:4(255-266)Online publication date: 17-Aug-2008

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media