Multicast source authentication for limited devices

  • Authors:
  • Janne Lundberg;Catharina Candolin;Hannu Kari

  • Affiliations:
  • Laboratory for Theoretical Computer Science, Helsinki University of Technology, Finland;Laboratory for Theoretical Computer Science, Helsinki University of Technology, Finland;Laboratory for Theoretical Computer Science, Helsinki University of Technology, Finland

  • Venue:
  • ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

Multicast has potential to make delivery of large files and streams over the Internet very efficient. However, strong source authentication for multicast is needed to make delivery of important data possible. Information such as stock quotes is valuable only if the data can be trusted. In this paper, we present an architecture which allows wireless mobile devices with limited computational abilities to receive source authenticated multicast over an unreliable wireless access network.