Download now Free registration required
The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture.
- Format: PDF
- Size: 370.6 KB