Efficient and secure source authentication scheme for multicast user authentication

Yoon-su Jeong , Sang-hyuk Lee , Seung-soo Shin

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (10) : 2741 -2746.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (10) : 2741 -2746. DOI: 10.1007/s11771-013-1792-4
Article

Efficient and secure source authentication scheme for multicast user authentication

Author information +
History +
PDF

Abstract

Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

Keywords

multicast / packet / source authentication / broadband Internet

Cite this article

Download citation ▾
Yoon-su Jeong, Sang-hyuk Lee, Seung-soo Shin. Efficient and secure source authentication scheme for multicast user authentication. Journal of Central South University, 2013, 20(10): 2741-2746 DOI:10.1007/s11771-013-1792-4

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

BergadanoF, CavagninoD, CrispoB. Individual single source authentication on the mbone [C]. IEEE International Conference on Multimedia and Expo. New York, NY, USA, 2000541-544

[2]

PerrigA, SongD, CanettiR, TygarJ D, BriscoeB. Timed efficient stream lossy-tolerant authentication (TESLA): Multicast source authentication transform introduction [C]. IETF RFC, 20054082

[3]

PerrigA, CanettiR, TygarJ D, SongD. Efficient and secure source authentication for multicast [C]. 8th Annual Internet Society Symp, Netowork and Distributed System Security (NDSS). San Diego, CA, USA, 200135-46

[4]

ChallalY, BettaharH, BouabdallahA. A2 cast: an adaptive source authentication protocol for multi cast streams [C]. 9th International Symposium on Computers and Communications (ISCC). Alexandria, Egypt, 2004363-368

[5]

GennaroR, RohatgiP. How to sign digital streams [J]. Information and Computation, 2001, 165(1): 100-106

[6]

GolleP, ModaduguN. Authenticating streamed data in the presence of random packet loss [C]. NDSS’01: The Network and Distributed System Security Symp San Diego, CA, USA, 200113-22

[7]

MinerS, StaddonJ. Graph-based authentication of digital streams [C]. IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2001232-246

[8]

HardjonoT, WeisB. The multicast group security architecture [R]. RFC 3740, 2004

[9]

PerrigA, CanettiR, TygarJ D, SongD. Efficient authentication and signing of multicast streams over lossy channels [C]. IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 200056-73

[10]

ChallalY, BouabdallahA, HinardY. RLH: Receiver driven layered hash-chaining for multicast data origin authentication [J]. Computer Communications Journal, 2004, 28(7): 726-740

[11]

HeJ X, XuG C, FuX D Z Z G. A hybrid and efficient scheme of multicast source authentication [C]. 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing IEEE. Qingdao, China, 2007123-125

[12]

PerrigA, CanettiR, WhillockB. TESLA: Multicast source authentication transform specification [D]. Internet draft, IETF, 2002

[13]

RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public key cryptosystems [J]. Communications of the ACM, 197, 21(2): 120–126.

[14]

RohatgiP. A compact and fast hybrid signature scheme for multicast packet authentication [C]. ACM Conference on Computer and Communications Security. New York, NY, USA, 199993-100

[15]

EltaiefH D, YoussefH. RMLCC: Recovery-based multi-layer connected chain mechaninsm for multicast source authenticaiton [C]. 35th Annual IEEE Conference on Local Computer Networks. Denver, Colorado, USA, 2010432-439

[16]

LiY, ZhangM, GuoY, XuG. Optimized source authentication scheme for multicast based on Merkle tree and TESLA [C]. IEEE International Conference on Information Theory and Information Security(ICITIS). Beijing, China, 2010195-198

AI Summary AI Mindmap
PDF

105

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/