Date of Award
Master of Science
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We present a signed acknowledgement scheme and three monitoring schemes to identify malicious peers in the overlay network. These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious. Results from our simulations indicate that the proposed schemes detect a high percentage of malicious peers with different cheating patterns, malicious peer percentages, network size and topologies. Experiments carried on the Planet Lab indicate no degradation in quality after the implementation of the proposed monitoring schemes.
Samarth Shetty B
Shetty B, Samarth, "Effective malicious peers identification schemes for overlay multicast streaming" (2006). Retrospective Theses and Dissertations. 19045.