电脑桌面
添加小米粒文库到电脑桌面
安装后可以在桌面快捷访问

电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展VIP免费

电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展_第1页
1/17
电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展_第2页
2/17
电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展_第3页
3/17
第1页共17页编号:时间:2021年x月x日书山有路勤为径,学海无涯苦作舟页码:第1页共17页MulticastreceiveraccesscontrolbyIGMP-ACOriginalResearchArticleComputerNetworksIPmulticastisbest-knownforitsbandwidthconservationandlowerresourceutilization.ThepresentservicemodelofmulticastmakesitdifficulttorestrictaccesstoauthorizedEndUsers(EUs)orpayingcustomers.Withoutaneffectivereceiveraccesscontrol,anadversarymayexploittheexistingIPmulticastmodel,whereahostorEUcanjoinanymulticastgroupbysendinganInternetGroupManagementProtocol(IGMP)joinmessagewithoutpriorauthenticationandauthorization.Wehavedevelopedanovel,scalableandsecuredaccesscontrolarchitectureforIPmulticastthatdeploysAuthenticationAuthorizationandAccounting(AAA)protocolstocontrolgroupmembership.Theprincipalfeatureoftheaccesscontrolarchitecture,receiveraccesscontrol,isaddressedinthispaper.TheEUorhostinformsthemulticastAccessRouter(AR)ofitsinterestinreceivingmulticasttrafficusingtheIGMPprotocol.WeproposethenecessaryextensionsofIGMPv3tocarryAAAinformation,calledIGMPwithAccessControl(IGMP-AC).ForEUauthentication,IGMP-ACencapsulatesExtensibleAuthenticationProtocol(EAP)packets.EAPisanauthenticationframeworktoprovidesomecommonfunctionsandanegotiationofthedesiredauthenticationmechanism.Thus,IGMP-ACcansupportavarietyofauthenticationsbyencapsulatingdifferentEAPmethods.Furthermore,wehavemodeledtheIGMP-ACprotocolinPROMELA,andalsoverifiedthemodelusingSPIN.WehaveillustratedtheEAPencapsulationmethodwithanexampleEAPmethod,EAPInternetKeyExchange(EAP-IKEv2).WehaveusedAVISPAtovalidatethesecuritypropertiesoftheEAP-IKEv2methodinpass-throughmode,whichfitswithintheIGMP-ACarchitecture.Finally,wehaveextendedourpreviouslydevelopedaccesscontrolarchitecturetoaccomplishinter-domainreceiveraccesscontrolanddemonstratedtheapplicabilityofIGMP-ACinamulti-domainenvironment.ArticleOutline1.Introduction2.Backgroundwork2.1.InternetGroupManagementProtocol(IGMP)第2页共17页第1页共17页编号:时间:2021年x月x日书山有路勤为径,学海无涯苦作舟页码:第2页共17页2.2.AAAprotocols2.3.Accesscontrolarchitecturewithe-commercecommunication2.3.1.Participantaccesscontrol2.3.2.e-Commercecommunication2.3.3.Policyenforcement2.3.4.Limitationofthearchitecture3.Problemdefinition3.1.EffectsofforgedIGMPreportmessages3.2.Goalsofreceiveraccesscontrol3.3.Groupkeymanagementvs.receiveraccesscontrol3.4.Relationshipofreceiveraccesscontroltokeymanagementandaccounting3.5.ReceiveraccesscontrolthroughextendedIGMP3.5.1.CouplingaccesscontrolwithIGMP3.5.2.ExtendingtheIGMPv3protocol4.Relatedwork5.IGMPwithAccessControl(IGMP-AC)5.1.Requirements5.2.Protocoldescriptions5.2.1.Hostbehavior5.2.2.RoleofAAAServer(AAAS)5.2.3.RoleofAccessRouter(AR)5.3.Additionalmessages5.4.Requiredreceptionstates5.4.1.Receptionstatesmaintainedbythehost5.4.2.ReceptionstatesmaintainedbytheAR5.5.SecuringIGMP-ACmessages6.VerificationofIGMP-ACusingSPIN6.1.Modeldescription6.2.Verificationresults7.AuthenticationusingEAP7.1.EAPencapsulationoverIGMP-AC7.2.EAP-IKEv2protocol第3页共17页第2页共17页编号:时间:2021年x月x日书山有路勤为径,学海无涯苦作舟页码:第3页共17页7.3.EnhancedsecurityforIGMP-ACmessages8.ValidationofEAP-IKEv2methodusingAVISPA8.1.SecuritypropertiesoftheEAP-IKEv2method8.2.Thepeer-to-peermodel8.2.1.Limitationsofthepeer-to-peermodel8.2.2.Securitygoals8.2.3.Findingtheattack8.2.4.Securingthepeer-to-peermodel8.3.Thepass-throughmodel9.Inte...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

电信与移动互联网行业 市场 企业 产品应用及无线网民的特点、行业发展

精品中小学文档+ 关注
实名认证
内容提供者

精品资料,值得下载

确认删除?
VIP
微信客服
  • 扫码咨询
会员Q群
  • 会员专属群点击这里加入QQ群
客服邮箱
回到顶部