The growth of network bandwidths has contributed to Internet traffic since the
introduction of packet switching. In recent years, new applications such as Peerto-
Peer (P2P) file sharing, multi-media, and mobile computing have increased
users’ expectations, motivating new designs in which various communication
links, such as grid , satellite, wireless and mobile computing, can securely
participate and handle traffic at higher layers of the protocol stack.
These new applications vary in traffic and connection characteristics in various
communication links. Most of them still use TCP for data transfer because of its
reliability and stability. There have also been performance issues in the
implementation of large networks that require high bandwidths.
These issues led to the development of new and different schemes with more
reliable characteristics and better congestion control to address the problems; one
example is XCP (i.e. Xplicit Congestion Protocol) . XCP demonstrates good
performance characteristics when tested on routers and on satellite systems
[23,24]. Other variants, such as STCP and DCCP, are designed to improve
congestion control. Some variants such as XCP face challenges on deployment
because they require changes in the routers in addition to the operating systems
of end hosts. Recent studies have shown that the gradual deployment to update
Internet facing routers results in a significant performance drop. With
characteristics similar to TCP, it also has security flaws.
Apart from congestion control and performance, for which TCP variants were
developed, security considerations need to be included in the architectural
designs of the new generation of protocols .
Developments in 2007 introduced the state-of-the-art UDT version 4 (UDTv4),
the fourth generation of UDT high performance data transfer protocol. UDT
introduces a new three-layer protocol architecture that is composed of a
connection flow multiplexer, enhanced congestion control and resource
management. The new design allows protocol to be shared by parallel
connections and to be used by future connections. It improves congestion control
and reduces connection set-up time. In addition, UDT provides better usability by
supporting a variety of network environments and application scenarios . It
addresses TCP’s limitations by reducing the overhead required to send and
receive streams of data. However, the pressure to reduce the cost and complexity
of running streaming applications over the Internet and through wireless and
mobile devices continues to mount. Moreover, users demand better security and
privacy for their communication links. Despite being widely used, there are a
number of serious security flaws inherent in TCP and UDP, and UDT.
This work focuses on UDT’s security requirements, based on existing network
protocols, aimed at preserving the security and privacy of the data flow. Since it
relies on UDP to check IP...