期刊文献+

Efficient and secure source authentication scheme for multicast user authentication 被引量:1

Efficient and secure source authentication scheme for multicast user authentication
下载PDF
导出
摘要 Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services. Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.
出处 《Journal of Central South University》 SCIE EI CAS 2013年第10期2741-2746,共6页 中南大学学报(英文版)
关键词 MULTICAST PACKET SOURCE AUTHENTICATION BROADBAND Internet multicast packet source authentication broadband Internet
  • 相关文献

参考文献16

  • 1BERGADANO F,CAVAGNINO D,CRISPO B. Individual single source authentication on the mbone[A].New York,USA,2000.541-544.
  • 2PERRIG A,SONG D,CANETTI R,TYGAR J D,BRISCOE B. Timed efficient stream lossy-tolerant authentication (TESLA):Multicast source authentication transform introduction[A].2005.4082.
  • 3PERRIG A,CANETTI R,TYGAR J D,SONG D. Efficient and secure source authentication for multicast[A].San Diego,California,USA,2001.35-46.
  • 4CHALLAL Y,BETTAHAR H,BOUABDALLAH A. A2 cast:an adaptive source authentication protocol for multi cast streams[A].Alexandria,Egypt,2004.363-368.
  • 5GENNARO R,ROHATGI P. How to sign digital streams[J].Information and Computation,2001,(01):100-106.doi:10.1006/inco.2000.2916.
  • 6GOLLE P,MODADUGU N. Authenticating streamed data in the presence of random packet loss[A].San Diego,California,USA,2001.13-22.
  • 7MINER S,STADDON J. Graph-based authentication of digital streams[A].Oakland,CA,USA,2001.232-246.
  • 8HARDJONO T,WEIS B. The multicast group security architecture[R].RFC 3740,2004.
  • 9PERRIG A,CANETTI R,TYGAR J D,SONG D. Efficient authentication and signing of multicast streams over lossy channels[A].Berkeley,CA,USA,2000.56-73.
  • 10CHALLAL Y,BOUABDALLAH A,HINARD Y. RLH:Receiver driven layered hash-chaining for multicast data origin authentication[J].Computer Communications,2004,(07):726-740.

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部