OMAC : a new access control architecture for overlay multicast communications
dc.contributor.author | Mohamed, Emad Eldin | |
dc.contributor.author | Barka, Ezedin | |
dc.date.accessioned | 2020-02-26T09:06:07Z | |
dc.date.available | 2020-02-26T09:06:07Z | |
dc.date.copyright | 2010 | |
dc.date.issued | 2011 | |
dc.description | This article is not available at CUD collection. The version of scholarly record of this Article is published in International Journal of Communication Systems (2011), available online at: https://doi.org/10.1002/dac.1185. | en_US |
dc.description.abstract | Multicast communications concern the transfer of data among multiple users. Multicast communications can be provided at the network layera-an example is IP multicasta-or at the application layer, also called overlay multicast. An important issue in multicast communications is to control how different usersa-senders, receivers, and delivery nodesa-access the transmitted data as well as the network resources. Many researchers have proposed solutions addressing access control in IP multicast. However, little attention has been paid to overlay multicast. In this paper, we investigate the access control issues in overlay multicast and present OMAC: a new solution to address these issues. OMAC provides access control for senders, receivers, and delivery nodes in overlay multicast. The proposed architecture, which is based on symmetric key cryptosystem, centralizes the authentication process in one server whereas it distributes the authorization process among the delivery nodes. Moreover, delivery nodes are utilized as a buffer zone between end systems and the authentication server, making it less exposed to malicious end systems. To evaluate our work, we have used simulation to compare the performance of OMAC against previous solutions. Results of the simulation show that OMAC outperforms previous multicast access control schemes. © 2010 John Wiley & Sons, Ltd. | en_US |
dc.identifier.citation | Mohamed, E. E., & Barka, E. (2011). OMAC: A new access control architecture for overlay multicast communications. International Journal of Communication Systems, 24(6), 761–775. https://doi.org/10.1002/dac.1185 | en_US |
dc.identifier.issn | 10745351 | |
dc.identifier.uri | http://dx.doi.org/10.1002/dac.1185 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12519/165 | |
dc.language.iso | en | en_US |
dc.publisher | John Wiley & Sons, Inc. | en_US |
dc.relation | Authors Affiliations: Mohamed, E.E., Faculty of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates, School of Engineering, Applied Science and Technology, Canadian University of Dubai, United Arab Emirates; Barka, E., Faculty of Information Technology, United Arab Emirates University, Al Ain, United Arab Emirates | |
dc.relation.ispartofseries | International Journal of Communication Systems;Vol. 24, no. 6 | |
dc.rights | License to reuse the abstract has been secured from John Wiley and Sons and Copyright Clearance Center. | |
dc.rights.holder | Copyright : 2010 John Wiley & Sons, Ltd. | |
dc.rights.license | License Number: 5241360340021 License date: Feb 03, 2022 | |
dc.rights.uri | https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=e608022b-f2ae-4c25-9c25-bcc7c0bfb3b5 | |
dc.subject | Access control architecture | en_US |
dc.subject | Access control schemes | en_US |
dc.subject | Application layers | en_US |
dc.subject | Authentication servers | en_US |
dc.subject | Buffer zones | en_US |
dc.subject | End systems | en_US |
dc.subject | IP Multicast | en_US |
dc.subject | Multicast communication | en_US |
dc.subject | Multicast security | en_US |
dc.subject | Multicasts | en_US |
dc.subject | Multiple user | en_US |
dc.subject | Network resource | en_US |
dc.subject | New solutions | en_US |
dc.subject | Overlay Multicast | en_US |
dc.subject | Proposed architectures | en_US |
dc.subject | Symmetric-key cryptosystem | en_US |
dc.subject | Authentication | en_US |
dc.subject | Communication | en_US |
dc.subject | Network architecture | en_US |
dc.subject | Network security | en_US |
dc.subject | Security systems | en_US |
dc.subject | Multicasting | en_US |
dc.title | OMAC : a new access control architecture for overlay multicast communications | en_US |
dc.type | Article | en_US |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: