- ...CLASS=INLINE>Ti.
- Note that this key schedule is
different from the previous schedule described in section 2.1,
where key was used to compute the MAC in interval and was
disclosed in interval .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...control.
- Source-Specific Multicast (SSM) is a new multicast
protocol, and a new IETF working group was formed in August 2000 [22].
SSM tends to address this problem by enforcing that only one legitimate sender
can send to the multicast group.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...space.
- We do not consider the flooding attack from a
network perspective (where flooding can cause link congestion and results in
dropping legitimate traffic) because any network protocol is susceptible to
this attack.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.