Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Enhancing Security by Embedding Biometric Data in IP Header
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Tiered authentication of multicast traffic in wireless ad-hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IPBio: embedding biometric data in IP header for per-packet authentication
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient targeted key subset retrieval in fractal hash sequences
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On name-based group communication: Challenges, concepts, and transparent deployment
Computer Communications
Hi-index | 0.00 |
Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group games, and video on demand. The lack of security obstructs a large deployment of this efficient communication model. This limitation motivated a host of research works that have addressed the many issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity, and access control. Many applications, such as broadcasting stock quotes and video-conferencing, require data origin authentication of the received traffic. Hence, data origin authentication is an important component in the multicast security architecture. Multicast data origin authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be heavy in volume (streaming). Besides, multicast data origin authentication must be robust enough against packet loss because most multicast multimedia applications do not use reliable packet delivery. Therefore, multicast data origin authentication is subject to many concurrent and competitive challenges, when considering these miscellaneous application-level requirements and features. In this article we review and classify recent works dealing with the data origin authentication problem in group communication, and we discuss and compare them with respect to some relevant performance criteria.