• Title/Summary/Keyword: multicast routing

Search Result 264, Processing Time 0.022 seconds

Authentication Mechanism for Efficient Multicast Service (효율적인 멀티캐스트 서비스를 위한 인증 기법)

  • Jung Yumi;Par Jung-Min;Chae Kijoon;Lee Sang-Ho;Nah Jaehoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.765-772
    • /
    • 2004
  • Multicast communication is simultaneous transmission of data to multiple receivers and saves considerably sender resources and network bandwidth. It has high risk to attack using group address and inherent complexity of routing packets to a large group of receivers. It is therefore critical to provide source authentication, allowing a receiver to ensure that received data is authentic. In this paper, we propose the multiple chain authentication scheme for secure and efficient multicast stream. To evaluate the performance of our scheme, we compare our technique with two other previously proposed schemes using simulation results. Our scheme provides non-repudiation of origin, low overhead by amortizing the signature operation over multiple packets, and high packet loss resistance.

Minimizing Cost and Delay in Shared Multicast Trees

  • Koh, Seok-Joo;Yi, Jong-Hwa;Hahm, Jin-Ho;Chin, Byoung-Moon;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.22 no.1
    • /
    • pp.30-37
    • /
    • 2000
  • Existing tree construction mechanisms are classified into source-based trees and center-based trees. The source-based trees produce a source-rooted tree with a low delay. However, for the applications with multiple senders, the management overheads for routing tables and resource reservations are too high. The center-based trees are easy to implement and manage, but a priori configuration of candidate center nodes is required, and the optimization mature such as tree cost and delay is not considered. In this paper, we propose a new multicast tree building algorithm. The proposal algorithm basically builds a non-center based shared tree. In particular, any center node is not pre-configured. In the purposed algorithm, a multicast node among current tree nodes is suitably assigned to each incoming user: Such a node is selected in a fashion that tree cost and the maximum end-to-end delay on the tree are jointly minimized. The existing and proposed algorithms are compared by experiments. In the simulation results, it is shown that the proposed algorithm approximately provides the cost saving of 30% and the delay saving of 10%, compared to the existing approaches. In conclusion, we see that the cost and delay aspects for multicast trees can be improved at the cost of additional computations.

  • PDF

Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network (군 하이브리드 네트워크에서 생존성 향상을 위한 다중 경로 멀티캐스팅)

  • Bang, June-Ho;Cho, Young-Jong;Kang, Kyungran
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.770-778
    • /
    • 2012
  • In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.

Link-State Routing Security Mechanism based on Double Hash Chain (이중 해쉬체인에 기반을 둔 Link-State 라우팅 보안 메커니즘)

  • 유병익;임정미;유선영;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.31-40
    • /
    • 2003
  • The current security issue for the Internet is focused on the security for user data. On the other hand, the research on the security for routing protocols is not so active, considering the importance of its role for the harmonious and accurate operation of the Internet. In this paper, we investigate the security problems of the link-state routing protocol which has been employed in the Internet, and suggest a new authentication mechanism for routing messages which complements and extends the previous ones. For this purpose, a concept of dual hash chains is newly introduced, which is provably secure, and we explain how to provide both the integrity and source authentication service for routing messages based on the session hash chains.

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.

An Efficient Multicast Routing Protocol for Ad-Hoc Networks with Mobility (이동성이 큰 에드-혹 네트워크를 위한 효율적인 멀티캐스트 라우팅 프로토콜)

  • Kim, Ye-Gyeong;Lee, Mi-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.1
    • /
    • pp.143-153
    • /
    • 2001
  • 본 논문에서는 에드-혹 망의 멀티캐스트 라우팅 프로토콜인 ODMRP(On-Demand Multicast Routing Protocol)를 확장한 PatchODMRP를 제안한다. ODMRP는 네트워크 상에서 멀티캐스트그룹의 송신원으로부터 수신원에 이르는 경로 상에 있는 노드들을 FG(Forwarding Group) 노드로 선출하여 이들이 해당 멀티캐스트그룹에 속하는 패킷을 모두 플러딩하도록 함으로써 멀티캐스트 그룹데이타 전송을 담당하는 메쉬를 구성하도록 하는 방안이다. 그런데 ODMRP는 주기적으로 이 메쉬를 구성하는 FG 노드들을 재 선정하기 때문에 이 주기가 길어지면 메쉬 구성이 네트워크 노드들의 이동성을 따라가지 못해 메쉬분리가 발생하고 데이터가 손실될수 있다. 반면에 이 주기를 짧게 하면 오버헤드가 지나치게 커질수 있다. 특히 송신원의 수가 적은 경우 ODMRP의 메쉬는 매우 성기게 형성되는데 이때 호스트들의 이동성이 크면 메쉬 연결을 유지하기 위하여 이 주기를 짧게 잡아주거나 높은 데이터 손실율을 감수해야한다. 본 논문에서는 이 문제점을 해결하고자 각 FG 노드들이 BEACON 신호를 이용해 자신에 인접한 메쉬에 손실이 발생한 것을 인지하고 이를 국부적인 플러딩을 통하여 빠르게 복구하는 메커니즘을 ODMRP에 추가한 PatchODMRP 방식을 제안한다. 시뮬레이션을 통하여 기존의 ODMRP와 제안하는 PatchODMRP의 성능을 비교한 결과 PatchODMRP가 호스트의 이동성에 훨씬 강하며 ODMRP에 비하여 낮은 오버헤드로 높은 데이터 전송률을 제공할 수 있음을 보여주었다.

  • PDF

A Study on a Robust Clustered Group Multicast in Ad-hoc Networks (에드-혹 네트워크에서 신뢰성 있는 클러스터 기반 그룹 멀티캐스트 방식에 관한 연구)

  • Park, Yang-Jae;Lee, Jeong-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.163-170
    • /
    • 2003
  • In this paper we propose a robust clustered croup Multicast in Ad-hoc network. The proposed scheme applies to weighted clustered Algorithm. Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network routing protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by scoped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

A Multicast-based Mobility Support Scheme in IPv6 Networks (IPv6 네트워크에서 멀티캐스트 기반 이동성 제공 방안)

  • Woo Mi ae;Jun Hong sun;Park Ho hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.210-217
    • /
    • 2005
  • With rapid advance in wireless communication technologies, many researches are conducted for providing Internet data services while users are roaming around. Efficient management of mobility of mobile nodes is essential as the use of real-time application program grows. In this paper, we propose a multicast-based localized mobility support scheme in IPv6 networks. The proposed scheme utilizes a class of multicast routing protocol for the localized mobility support. Features of the proposed scheme are use of join to a multicast group and leave from that group to localize binding update information and provision of an extended multicast group management mechanism to reduce leave latency. The results of simulation show that the proposed scheme out-performs Mobile IPv6 and Hierarchical Mobile IPv6 in UDP and TCP traffic performance and in wasted bandwidth.

Delay Guaranteed Bandwidth-Efficient Multicast Routing in Wireless Multi-hop Networks (다중 홉 무선 네트�p에서 지연을 고려한 멀티케스트 루팅)

  • Sohn, Hee-Seok;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.2
    • /
    • pp.53-65
    • /
    • 2016
  • Static wireless multi-hop networks, such as wireless mesh networks and wireless sensor networks have proliferated in recent years because of they are easy to deploy and have low installation cost. Two key measures are used to evaluate the performance of a multicast tree algorithm or protocol : end-to-end delay and the number of transmissions. End-to-end delay is the most important measure in terms of QoS because it affects the total throughput in wireless networks. Delay is similar to the hop count or path length from the source to each destination and is directly related to packet success ratio. In wireless networks, each node uses the air medium to transmit data, and thus, bandwidth consumption is related to the number of transmission nodes. A network has many transmitting nodes, which will cause many collisions and queues because of congestion. In this paper, we optimize two metrics through a guaranteed delay scheme. We provide an integer linear programming formulation to minimize the number of transmissions with a guaranteed hop count and preprocessing to solve the aforementioned problem. We extend this scheme not only with the guaranteed minimum hop count, but also with one or more guaranteed delay bounds to compromise two key metrics. We also provide an explanation of the proposed heuristic algorithm and show its performance and results.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.