Next Article in Journal
Deductive Verification Method of Real-Time Safety Properties for Embedded Assembly Programs
Previous Article in Journal
A Subthreshold Bootstrapped SAPTL-Based Adder Design
Open AccessArticle

Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network

Department of Computer Science and Information Technology, La Trobe University, Victoria 3086, Australia
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(10), 1162; https://doi.org/10.3390/electronics8101162
Received: 19 September 2019 / Revised: 1 October 2019 / Accepted: 4 October 2019 / Published: 14 October 2019
(This article belongs to the Section Networks)
Internet Protocol (IP) multicasting is a method for one-to-many and many-to-many communication between hosts in an IP network. This communication happens in a real-time synchronous fashion. It is a useful mechanism for distributing management data in a Local Area Network (LAN). Management data includes frequent updating of host Operating System (OS), security patches, OS update for network hardware, new configuration updates, etc. In the absence of any admission control or a source identification, any host with malicious intent can disseminate malicious codes or rootkits exploiting the underlying multicast framework. Routing protocols like RIPv2 and OSPF use a certain form of authentication to exchange routing information with their peer routers. However, their authentication and the distribution of routing information in its present form has several security and performance-related issues. Motivated through these problems, in this paper, we propose an efficient and scalable multicast architecture for distributing management and routing information in a LAN. We use Core-based Tree (CBT) for constructing the multicast delivery tree and the pseudo identity-based encryption of the underlying cryptosystem. We also demonstrate that our proposed multicast architecture is immune to a number of popular attacks. View Full-Text
Keywords: multicast; pseudo-identity based encryption; core based tree; secure routing multicast; pseudo-identity based encryption; core based tree; secure routing
Show Figures

Figure 1

MDPI and ACS Style

Veeraraghavan, P.; Hanna, D.; Pardede, E. Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network. Electronics 2019, 8, 1162.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop