全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

DOI: 10.1155/2012/540801

Full-Text   Cite this paper   Add to My Lib

Abstract:

The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH) key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet. 1. Introduction Due to the prevalent broadband Internet access and advanced video compression techniques, the Internet Protocol Television (IPTV) has been emerging as one of the most popular Internet applications. IPTV can further benefit Internet users by entertainment, social, and business values, but IPTV faces more challenges of scalability, privacy, and service quality over the public Internet due to the conventional client-server architecture applied. The success of well-known P2P video-streaming systems such as PPStream [1], PPLive [2], Sopcast [3], and TVants [4] has proven that P2P paradigm is a feasible solution to deliver bandwidth-hunger IPTV media content in large scale over the pervasive Internet. However, the above-mentioned proprietary P2P video-streaming systems still suffer the issues of long startup delays, significant video-switching delays, large peer playback lags, and security due to the peer heterogeneity and churn [5–7]. Therefore, the P2P overlay networks for future multimedia Internet should overcome the previous shortcomings to further promise quality of service, security, and experience to the IPTV end users. Moreover, the P2P overlay architecture for promising IPTV services should be not only easily convergent in heterogeneous networks, but also feasibly integrated with other Internet applications. In this paper, we apply SIP protocol [8] to construct an application-layer multicast (ALM) overlay network, which is called SIPTVMON, with privacy protection, load balancing, and stability for IPTV to overcome the disadvantages

References

[1]  PPStream, http://www.ppstream.com.
[2]  PPLive, http://www.pptv.com.
[3]  SopCast, http://www.sopcast.org.
[4]  TvAnts, http://tvants.en.softonic.com.
[5]  X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, “A measurement study of a large-scale P2P IPTV system,” IEEE Transactions on Multimedia, vol. 9, no. 8, pp. 1672–1687, 2007.
[6]  X. Hei, Y. Liu, and K. W. Ross, “IPTV over P2P streaming networks: the mesh pull approache,” IEEE Communications Magazine, vol. 46, no. 2, pp. 86–92, 2008.
[7]  D. Ciullo, M. A. Garcia, A. Horvath et al., “Network awareness of P2P live streaming applications: a measurement study,” IEEE Transactions on Multimedia, vol. 12, no. 1, pp. 54–63, 2010.
[8]  H. Schulzrinne and J. Rosenberg, “The IETF internet telephony architecture and protocols,” IEEE Network, vol. 13, no. 3, pp. 18–23, 1999.
[9]  K. Malhotra, S. Gardner, and R. Patz, “Implementation of elliptic-curve cryptography on mobile healthcare devices,” in Proceedings of the IEEE International Conference on Networking, Sensing and Control (ICNSC '07), pp. 239–244, London, UK, April 2007.
[10]  C. H. Wang, Y. H. Chu, and T. T. Wei, “SIPTVMON: a secure multicast overlay network for load-balancing and stable IPTV service using SIP,” in Proceedings of the 30th IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS '11), pp. 97–102, Shanghai, China, April 2011.
[11]  G. Camarillo and M. A. Garcia-Martin, The 3G IP Multimedia Subsystem-Merging the Internet and the Cellular Worlds, John Wiley & Sons, New York, NY, USA, 2004.
[12]  F. Wang, Y. Xiong, and J. Liu, “MTreebone: a collaborative tree-mesh overlay network for multicast video streaming,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 3, pp. 379–392, 2010.
[13]  Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, “Enabling conferencing applications on the internet using an overlay multicast architecture,” in Proceedings of the ACM Applications, Technologies, Architectures, and Protocols for Computers Communications (SIGCOMM '01), pp. 55–67, August 2001.
[14]  C. K. Yeo, B. S. Lee, and M. H. Er, “Application layer multicast architecture for media streaming,” in Proceedings of the 7th IASTED International Conference on Internet and Multimedia Systems and Applications, pp. 455–460, Honolulu, Hawaii, USA, August 2003.
[15]  C. K. Yeo, B. S. Lee, and M. H. Er, “A survey of application level multicast techniques,” Computer Communications, vol. 27, no. 15, pp. 1547–1568, 2004.
[16]  D. Ren, Y.-T. H. Li, and S.-H. G. Chan, “Fast-mesh: a low-delay high-bandwidth mesh for peer-to-peer live streaming,” IEEE Transactions on Multimedia, vol. 11, no. 8, pp. 1446–1456, 2009.
[17]  http://www.cryptopp.com/benchmarks.html.
[18]  J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman, “Multimedia Internet KEYing (MIKEY),” IETF, RFC 3830, August 2004.
[19]  M. E. Hellman, “An overview of public key cryptography,” IEEE Communications Magazine, pp. 42–49, 2002.
[20]  C. C. Yang, R. C. Wang, and W. T. Liu, “Secure authentication scheme for session initiation protocol,” Computers & Security, vol. 24, no. 5, pp. 381–386, 2005.
[21]  M. Handley and V. Jacobson, “Session Description Protocol (SDP),” IETF, RFC4566, July 2006.
[22]  H. Schulzrinne, et al., “RTP: A Transport Protocol for Real-Time Applications,” IETF RFC 3550, July 2003.
[23]  Y. Chu, S. G. Rao, S. Seshan, and H. Zhang, “A case for end system multicast,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 8, pp. 1456–1471, 2002.
[24]  C. Anderson, “The long tail,” in Wired, 2004.
[25]  D. Andersen, “Resilient overlay networks,” SIGOPS, vol. 35, pp. 131–145, 2001.
[26]  G. Tan and S. A. Jarvis, “Improving the fault resilience of overlay multicast for media streaming,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 6, pp. 721–734, 2007.
[27]  K. Sripanidkulchai, A. Ganjam, B. Maggs, and H. Zhang, “The feasibility of supporting large-scale live streaming applications with dynamic application end-points,” in Proceedings of the ACM Conference on Computer Communications (SIGCOMM '04), pp. 107–120, Portland, Ore, USA, September 2004.
[28]  OMNet++, http://www.omnetpp.org/.
[29]  PlanetLab, an open platform for developing, deploying and accessing planetary-scale serviceshttp://www.planet-lab.org/.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133