Degree Type
Thesis
Date of Award
1-1-2006
Degree Name
Master of Science
Major
Computer Science
Abstract
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We present a signed acknowledgement scheme and three monitoring schemes to identify malicious peers in the overlay network. These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious. Results from our simulations indicate that the proposed schemes detect a high percentage of malicious peers with different cheating patterns, malicious peer percentages, network size and topologies. Experiments carried on the Planet Lab indicate no degradation in quality after the implementation of the proposed monitoring schemes.
Copyright Owner
Samarth Shetty B
Copyright Date
2006
Language
en
OCLC Number
76831201
File Format
application/pdf
File Size
65 pages
Recommended Citation
Shetty B, Samarth, "Effective malicious peers identification schemes for overlay multicast streaming" (2006). Retrospective Theses and Dissertations. 19045.
https://lib.dr.iastate.edu/rtd/19045