End-to-end internet packet dynamics
IEEE/ACM Transactions on Networking (TON)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Information and Computation
Efficient Multicast Packet Authentication Using Signature Amortization
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A graph-theoretical analysis of multicast authentication
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
A/sup 2/cast: an adaptive source authentication protocol for multicast streams
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
MLCC: A new hash-chained mechanism for multicast source authentication
International Journal of Communication Systems - Secure communications and data management in ubiquitous services
Security issues and solutions in multicast content distribution: a survey
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
One of the main issues in securing multicast communication is the source authentication service. In this work we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead, computing efficiency and robustness against packet loss are important parameters to be taken into account when designing a multicast source authentication mechanism. The main contribution of this paper consists of a multicast source authentication mechanism based on an adaptive hash chaining structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. It adapts the redundancy chaining degree (the amount of authentication information) depending on the actual packet loss ratio in the network. Compared to other mechanisms fitting in the same category, NS-2 simulations show that the adaptation of the redundancy degree allows to save bandwidth, allows to increase the robustness to packet loss and generate an authentication delay required by the used application.