期刊文献+

Performance optimization for multicast packet authentication 被引量:1

Performance optimization for multicast packet authentication
下载PDF
导出
摘要 In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead. In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead.
作者 李保红
出处 《Journal of Chongqing University》 CAS 2005年第3期154-157,共4页 重庆大学学报(英文版)
基金 Supported by the Natural Science Foundation of China (No. 60173066)
关键词 Multicast packet authentication hash chains burst loss authentication probability 杂乱信号链 信息包 多点传送 概率 Markov链
  • 相关文献

同被引文献9

  • 1WANG Weidong,LI Zhitang,LU Chuiwei,ZHANG Yejiang.An Efficient Multicast Source Authentication Protocol[J].Wuhan University Journal of Natural Sciences,2006,11(6):1831-1834. 被引量:1
  • 2WONG C K, LAM S S. Digital signatures for flows and muhicasts[ J]. IEEE ACM Trans on Networking, 1999,7(4) :502-513.
  • 3GENNARO R, ROHATG! P. How to sign digital streams [ J ]. Information and Computation ,2001,365 ( 1 ) : 100-116.
  • 4GOLLE P, MODADUGO N. Streamed authentication in the presence of random packet loss[ C ]//Proc of ISOC Network and Distributed System Security Symposium. 2001:13-22.
  • 5PERRIG A, CANETTI R, TTGAR J D, et al. Efficient authentication and signing of muhicast streams over lossy channels [ C]//Proc of IEEE Symposium on Security and Privacy. 2000:56-73.
  • 6BERGADANO F, CAVAGNINO D. Dealing with packet loss in the interactive chained stream authentication protocol [ J ]. Computers & Security,2005,24 (2) :139-146.
  • 7BERGADANO F, CAVAGNINO D, CRISPO B. Individual authentication in multiparty communications [ J ]. Computers & Security, 2002,21 (8) :719-735.
  • 8PARK Y S, CHUNG T S, CHO Y. An efficient stream authentication scheme using tree chaining[ J]. Information Processing Letters, 2003,86( 1 ) :1-8.
  • 9BARNETT C A. Efficient reliable and secure source authentication schemes for real-time multicast [ D ]. Maryland : University of Maryland, 2003.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部