Resource requirement analysis for a predictive-hashing based multicast authentication protocol

  • Authors:
  • Seonho Choi;Yanggon Kim

  • Affiliations:
  • Department of Computer Science, Bowie State University, Bowie, MD;Department of Computer & Information Sciences, Towson University, Towson, MD

  • Venue:
  • EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

A new multicast authentication scheme for real-time streaming applications was proposed [28] that is resistant to denial-of-service attacks with less resource usages (CPU and buffer) at receivers compared to previously proposed schemes. This scheme utilizes prediction hashing (PH) and one-way key chain (OKC) techniques based on erasure codes and distillation codes. Detailed protocol description is presented at the sender and receiver sides, and a worst-case resource (memory and CPU) requirement at the receiver-side is obtained with an assumption of security condition.