About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Integrated Approach for Multicast Source Authentication and Congestion Control

Download(Requires a free EAI acccount)
552 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_2,
        author={Karan Singh and Rama Yadav},
        title={Integrated Approach for Multicast Source Authentication and Congestion Control},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Computer Network Multicast Communication Congestion Control Source Authentication Attack Congestion Control Security Goal Layer System},
        doi={10.1007/978-3-642-37949-9_2}
    }
    
  • Karan Singh
    Rama Yadav
    Year: 2013
    Integrated Approach for Multicast Source Authentication and Congestion Control
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_2
Karan Singh, Rama Yadav

    Abstract

    The coming age is information age in which data is being transmitted from network source to destination using unicast and multicast. Multicast services are very popular for transmission of huge information. Therefore, multicast network are growing day by day and it faces various problems such as reliability, security, congestion, connectivity scalability, fairness etc., due to exponential increment of network. Multicast Congestion is very serious problem to decrease the network utilization if network is not secure then condition may be worst and it is difficult to handle the situation. In this paper, we are providing secure multicast congestion control mechanism. In this mechanism global and local approach is proposed which provide the secure information in presence of congestion at minimum or any cost.

    Keywords
    Computer Network Multicast Communication Congestion Control Source Authentication Attack Congestion Control Security Goal Layer System
    Published
    2013-07-09
    http://dx.doi.org/10.1007/978-3-642-37949-9_2
    Copyright © 2013–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL