Degree Type

Thesis

Date of Award

1-1-2006

Degree Name

Master of Science

Major

Computer Science

Abstract

Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We present a signed acknowledgement scheme and three monitoring schemes to identify malicious peers in the overlay network. These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious. Results from our simulations indicate that the proposed schemes detect a high percentage of malicious peers with different cheating patterns, malicious peer percentages, network size and topologies. Experiments carried on the Planet Lab indicate no degradation in quality after the implementation of the proposed monitoring schemes.

Copyright Owner

Samarth Shetty B

Language

en

OCLC Number

76831201

File Format

application/pdf

File Size

65 pages

Share

COinS