PIM-SM Based Multicast Security
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the rapid development of the network technology, more bandwidth is required. Multicast transmission offers efficient network resource consumption. Multicast security is a hot issue. Multicast security problem hinders the development of multicast technology. This paper discusses the principles of multicast protocol PIM-SM and makes a detailed description of a method to prevent vicious multicast source attacking. The method can improve the reliability of multicast system.

    Reference
    Related
    Cited by
Get Citation

黄舒,董喜明,郭云峰.基于PIM-SM协议IP组播安全技术.计算机系统应用,2014,23(6):196-200

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 25,2013
  • Revised:December 09,2013
  • Adopted:
  • Online: June 20,2014
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063