An Efficient Multicast Source Authentication Protocol

被引:1
|
作者
WANG Weidong~ 1
2. College of Computer Science and Technology
机构
关键词
source authentication; multi-tree-chains; multicast;
D O I
暂无
中图分类号
TP393.04 [];
学科分类号
摘要
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.
引用
收藏
页码:1831 / 1834
页数:4
相关论文
共 50 条
  • [21] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [22] An efficient protocol for anonymous multicast and reception
    Chang, CC
    Chung, CY
    INFORMATION PROCESSING LETTERS, 2003, 85 (02) : 99 - 103
  • [23] An efficient multicast protocol for PCS networks
    Aravamudhan V.
    Ratnam K.
    Rangarajan S.
    Mobile Networks and Applications, 1997, 2 (4) : 333 - 344
  • [24] Efficient multicast protocol for PCS networks
    Aravamudhan, Vanitha
    Ratnam, Karunaharan
    Rangarajan, Sampath
    Mobile Networks and Applications, 1998, 2 (04): : 333 - 344
  • [25] An efficient multi-source multicast routing protocol in mobile ad hoc networks
    Su, YY
    Hwang, SF
    Dow, CR
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 8 - 14
  • [26] Efficient multicast packet authentication using signature amortization
    Park, JM
    Chong, EKP
    Siegel, HJ
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 227 - 240
  • [27] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [28] EFFICIENT MULTICAST SOURCE ROUTING SCHEME
    CHEN, WT
    SHEU, PR
    CHANG, YR
    COMPUTER COMMUNICATIONS, 1993, 16 (10) : 662 - 666
  • [29] Efficient mechanism for source mobility in source specific multicast
    Lee, Hoyoung
    Han, Sunyoung
    Hong, Jin Pyo
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 82 - 91
  • [30] Efficient packet-injection resistant data source authentication protocol for group communication
    Tang, Hong
    Zhu, Lie-Huang
    Li, Jian
    Cao, Rui-Qiang
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 96 - 100