期刊文献+

组播用户安全管理系统设计与实现

Design and implementation of secure management for multicast receivers
下载PDF
导出
摘要 为了克服IP组播模型的开放性,使得在现有互联网条件下能够为组播管理者提供用户对频道的访问控制,在原有安全组播模型的基础上,提出了一种基于IPv6网络环境的组播用户安全管理系统模型的设计方案。该方案采用钩子(hook)机制在接入路由器上挂载了认证与访问控制模块,任何想要监听组播流的用户,都要通过该模块进行身份认证与频道访问权限的判定,从而实现了基于频道的组播用户安全管理。并在教育科研骨干网中实验验证了该系统的身份认证和访问控制功能。 To overcome the openness of the IP multicast model, and making it possible for multicast manager to achieve user access control toward channel in current Internet condition, secure management for multicast receivers under IPv6 condition is pro- posed based on quondam secure multicast model. Hook mechanism will be used to add authentication model to the access router in this system. Any multicast receiver must go through this model for identity authentication and access control. Then, secure management for multicast receivers can be partly achieved. Moreover, the function of identity authentication and access control is verified by testing this system during cernet condition.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第8期2951-2955,共5页 Computer Engineering and Design
基金 国家科技支撑计划基金项目(2008BAH37B03)
关键词 组播 IPV6 认证 访问控制 CERNET multicast IPv6 authentication access control Cernet
  • 相关文献

参考文献13

  • 1黄鹏.浅议IP组播技术在视频中的应用[J].硅谷,2011,4(5):119-119. 被引量:3
  • 2邵艳玲,鲁庆宾.基于IP组播的视频直播教学系统的应用研究[J].计算机与现代化,2010(12):98-101. 被引量:4
  • 3Kamil Sarac, Kevin C Almeroth. Monitoring IP multicast in the internet: Recent advances and ongoing challenges [J]. Network and Service Management, 2006, 43 (10): 85-91.
  • 4Jay Xiong, Shi Baw Ch' ng. Authentication protocol [P]. U. S. Pantent, 0162926A1, 2008-07-03.
  • 5Riham Abdellatif, Heba K Aslan, Salwa H Elramly. New real time multicast authentication protocol [J]. International Journal of Network Security, 2011, 12 (1):13-20.
  • 6Parvatha Varthini B, Valli S. Performance analysis of rekey protocols in multicast group key managementv [J]. Information Technology, 2006, 5 (3): 405-408.
  • 7Desmond Ng W H, Howarth M, SUN Z, et al. Dynamic balanced key tree management for secure multicast communications [J]. IEEE Transactionson Computers, 2007, 56 (5) : 590-605.
  • 8MU Haibing, ZHANG Changlun, ZENG Ping. Role-based access control model for multicast in MANET [C]. International Conference on Computer Science & Education, 2008: 816-819.
  • 9Salekul Islam, William Atwood J. Multicast receiver access control by IGMP AC[J]. Computer Networks, 2009, 53 (7): 989-1013.
  • 10Venkataraman V, Yoshida K, Francis P. Chunkyspread: Heterogeneous unstructured end system multicast[C]. Cornell U- niversity Proc of IEEE ICNP, 2006.

二级参考文献13

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部