TY - GEN
T1 - Securing RSVP For Multimedia Applications
AU - Talwar, Vanish
AU - Nahrstedt, Klara
N1 - Publisher Copyright:
Copyright © ACM 2000.
PY - 2000
Y1 - 2000
N2 - Distributed multimedia applications require end-to-end quality of service(QoS) in order to be accepted and used. One approach to achieve end-to-end QoS is to provide end-to-end resource reservations. Resource ReSerVation Protocol (RSVP) [5] [1] is a unicast and multicast signalling protocol for setting up network bandwidth reservation. In this paper, we propose a solution for securing RSVP messages in a flexible, efficient and scMable manner. Our solution extends the RSVP protocol with a scalable QoS protection, using a hybrid hierarchical security approach. The RSVP messages go through two different protocol treatments - one within subnetworks and the other across subnetworks. We use delayed integrity checking within the subnetwork by sending feedback messages from the egress node. A stronger integrity and encryption check is made on messages sent across subnetworks. Our solution is thus an intermediate approach between the extremes of hop by hop authentication [2] and the SDS/CD protocol [8] and overcomes the drawbacks of the two protocols.
AB - Distributed multimedia applications require end-to-end quality of service(QoS) in order to be accepted and used. One approach to achieve end-to-end QoS is to provide end-to-end resource reservations. Resource ReSerVation Protocol (RSVP) [5] [1] is a unicast and multicast signalling protocol for setting up network bandwidth reservation. In this paper, we propose a solution for securing RSVP messages in a flexible, efficient and scMable manner. Our solution extends the RSVP protocol with a scalable QoS protection, using a hybrid hierarchical security approach. The RSVP messages go through two different protocol treatments - one within subnetworks and the other across subnetworks. We use delayed integrity checking within the subnetwork by sending feedback messages from the egress node. A stronger integrity and encryption check is made on messages sent across subnetworks. Our solution is thus an intermediate approach between the extremes of hop by hop authentication [2] and the SDS/CD protocol [8] and overcomes the drawbacks of the two protocols.
UR - http://www.scopus.com/inward/record.url?scp=33847063867&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847063867&partnerID=8YFLogxK
U2 - 10.1145/357744.357916
DO - 10.1145/357744.357916
M3 - Conference contribution
AN - SCOPUS:33847063867
T3 - MULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia
SP - 153
EP - 156
BT - MULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia
PB - Association for Computing Machinery
T2 - 2000 ACM Workshops on Multimedia, MULTIMEDIA 2000
Y2 - 30 October 2000 through 3 November 2000
ER -