An Efficient Multicast Source Authentication Protocol

被引:1
|
作者
WANG Weidong~ 1
2. College of Computer Science and Technology
机构
关键词
source authentication; multi-tree-chains; multicast;
D O I
暂无
中图分类号
TP393.04 [];
学科分类号
摘要
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.
引用
收藏
页码:1831 / 1834
页数:4
相关论文
共 50 条
  • [1] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221
  • [2] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [3] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [4] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [5] A hybrid and efficient scheme of multicast source authentication
    Jin-xin, He
    Gao-chao, Xu
    Xiao-dong, Fu
    Zhi-guo, Zhou
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 123 - +
  • [6] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [7] Authenticast: a source authentication protocol for multicast flows and streams
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 175 - 178
  • [8] Efficient non-repudiation multicast source authentication schemes
    Xianxian Li
    Jinpeng Huai
    Journal of Computer Science and Technology, 2002, 17 : 820 - 829
  • [9] Efficient non-repudiation multicast source authentication schemes
    Li, XX
    Huai, JP
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06) : 820 - 829
  • [10] A2Cast:: an adaptive source authentication protocol for multiCAST streams
    Challal, Y
    Bettahar, H
    Bouabdallah, A
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 363 - 368