Publications
Security implications of adaptive multimedia distribution
June 6, 1999
Conference Paper
Published in:
Proc. IEEE Int. Conf. on Communications, Multimedia and Wireless, Vol. 3, 6-10 June 1999, pp. 1563-1567.
Topic:
R&D area:
Summary
We discuss the security implications of different techniques used in adaptive audio and video distribution. Several sources of variability in the network make it necessary for applications to adapt. Ideally, each receiver should receive media quality commensurate with the capacity of the path leading to it from each sender. Several different techniques have been proposed to provide such adaptation. We discuss the implications of each technique for confidentiality, authentication, integrity, and anonymity. By coincidence, the techniques with better performance also have better security properties.
Summary
We discuss the security implications of different techniques used in adaptive audio and video distribution. Several sources of variability in the network make it necessary for applications to adapt. Ideally, each receiver should receive media quality commensurate with the capacity of the path leading to it from each sender. Several...
READ MORE
Vulnerabilities of reliable multicast protocols
October 21, 1998
Conference Paper
Published in:
IEEE MILCOM '98, Vol. 3, 21 October 1998, pp. 934-938.
Topic:
R&D area:
Summary
We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.
Summary
We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.
READ MORE