Securing RSVP For Multimedia Applications

Vanish Talwar, Klara Nahrstedt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Distributed multimedia applications require end-to-end quality of service(QoS) in order to be accepted and used. One approach to achieve end-to-end QoS is to provide end-to-end resource reservations. Resource ReSerVation Protocol (RSVP) [5] [1] is a unicast and multicast signalling protocol for setting up network bandwidth reservation. In this paper, we propose a solution for securing RSVP messages in a flexible, efficient and scMable manner. Our solution extends the RSVP protocol with a scalable QoS protection, using a hybrid hierarchical security approach. The RSVP messages go through two different protocol treatments - one within subnetworks and the other across subnetworks. We use delayed integrity checking within the subnetwork by sending feedback messages from the egress node. A stronger integrity and encryption check is made on messages sent across subnetworks. Our solution is thus an intermediate approach between the extremes of hop by hop authentication [2] and the SDS/CD protocol [8] and overcomes the drawbacks of the two protocols.

Original languageEnglish (US)
Title of host publicationMULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia
PublisherAssociation for Computing Machinery
Pages153-156
Number of pages4
ISBN (Electronic)9781581133110
DOIs
StatePublished - 2000
Externally publishedYes
Event2000 ACM Workshops on Multimedia, MULTIMEDIA 2000 - Los Angeles, United States
Duration: Oct 30 2000Nov 3 2000

Publication series

NameMULTIMEDIA 2000 - Proceedings of the 2000 ACM Workshops on Multimedia

Conference

Conference2000 ACM Workshops on Multimedia, MULTIMEDIA 2000
Country/TerritoryUnited States
CityLos Angeles
Period10/30/0011/3/00

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'Securing RSVP For Multimedia Applications'. Together they form a unique fingerprint.

Cite this