期刊文献+

基于Hash链的高效组播源认证协议

Effective Multicast Source Authentication Protocol Based on Hash-Chaining
下载PDF
导出
摘要 针对现有基于Hash链思想的组播源认证协议存在接收方认证延迟和抗丢包性弱的缺陷,提出一种基于Hash链的高效组播源认证协议。该协议结合了向前方数据包添加Hash值的方法,将链中发送的数据包签名,在接收方实现实时认证。通过合理选择目标包,增强协议抗丢包性。同时,采用在接收方添加变化阈值的方法,改进了接收方反馈子网丢包率方式,节约了网络带宽,减轻了发送方的计算开销。文中给出了具体的设计方案,与相关组播源认证协议比较,其具有实时认证、抗丢包鲁棒性、减轻网络负担和发送方计算开销的特点。 To the main limitation that current multicast source authentication protocol based on the idea of Hash-chaining have authentication delay at the receivers and are not robust against packet losses,this paper presents an effective multicast source authentication protocol based on Hash-chaining.In this protocol,the Hash value is put into preceding packet,and the first sending packet is signed in Hash-chaining,performing authentication in real-time at receivers.Through selecting object packet in a reasonable manner,the ability of tolerating packet loss is improved.At the same time,through adding threshold of variety at receiver,it changes the feedback way of losing packet ratio at receivers in subnet so as to save bandwidth and alleviate computation overheads at sender.The design of new protocol is concretely presented in this paper.Through comparing with related multicast source authentication protocol,it has the following traits:performing authentication in real-time at receivers, tolerating packet loss,saving bandwidth and alleviating computation overheads at sender.
出处 《电信科学》 北大核心 2010年第10期66-70,共5页 Telecommunications Science
基金 国家自然科学基金资助课题"认知无线电安全关键技术研究"(No.60773074)
关键词 组播安全 HASH链 源认证 抗抵赖性 multicast security Hash-chaining source authentication non-repudiation
  • 相关文献

参考文献10

  • 1Xu Zhiming, Wang Yu, Zhu Jingguo. A reliable multicast routing protocol for high-speed mobile ad hoc networks: R-ODMRP. Journal of Software,2010,5(1) : 20-27.
  • 2Singh K, Yadav R, Shankar S. Adaptive muhicast source authentication. In: 2009 IEEE International Advance Computing Conference, IACC, Patiala India, March 2009.
  • 3Obana S, Kurosawa K. Bounds and combinatorial structure of (k,n) multi-receiver a-codes. Designs,Codes and Cryptography. 2001,22( 1 ) :47-63.
  • 4Perrig A, Canetti R, Tygar J D, et al. The TESLA broadcast authentication protocol. RSA CryptoBytes, 2002 (5).
  • 5Ruiying D, Song W. An improved scheme of μTESLA authentication based trusted computing platform. In: 2008 International Conference on Wireless Communications, Jhalwa India, December 2008.
  • 6Yacine C,Abdelmadjid B, Yoann H. RLH :receiver driven layered Hash-chaining for muhieast data origin authentication. Computer Communications, 2005 (28) : 726-740.
  • 7Perrig A, Canetti R ,Tygar J D, et al. Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,Berkeley California USA, May 2000.
  • 8Yacine C, Abdelmadjid B, Hatem B. H2A: hybrid hashchaining scheme for adaptive muhicast source authentication of media-streaming. Computers & Security, 2005 (24) : 57-68.
  • 9Younis M, Farrag O. Tiered authentication of muhicast traffic in wireless ad hoc networks. In: 2009 IEEE Global Telecommunications Conference, Hawaii USA, Nov 2009.
  • 10Ehaief H, Youssef H. MLCC : a new hash-chained mechanism for muhicast source authentication. International Journal of Communication Systems, 2009,22 (9) : 1069- 1087.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部