An Efficient Multicast Source Authentication Protocol

被引:1
|
作者
WANG Weidong~ 1
2. College of Computer Science and Technology
机构
关键词
source authentication; multi-tree-chains; multicast;
D O I
暂无
中图分类号
TP393.04 [];
学科分类号
摘要
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.
引用
收藏
页码:1831 / 1834
页数:4
相关论文
共 50 条
  • [41] Verifications of RMP: An efficient reliable multicast protocol
    Jia, WJ
    Nett, E
    Cao, JN
    Kaiser, J
    SECOND INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN '96), PROCEEDINGS, 1996, : 388 - 393
  • [42] An Efficient Multicast Hybrid Routing Protocol for MANETs
    Sethi, Srinivas
    Udgata, Siba K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 22 - +
  • [43] Efficient multicast stream authentication for the fully adversarial network model
    Tartary, C
    Wang, HX
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 108 - 125
  • [44] Efficient authentication and signing of multicast streams over lossy channels
    Perrig, A
    Canetti, R
    Tygar, JD
    Song, D
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 56 - 73
  • [45] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    Althouse, Bryan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
  • [46] A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy
    Chang, Chin-Chen
    Cheng, Ting-Fang
    FUNDAMENTA INFORMATICAE, 2014, 131 (02) : 167 - 186
  • [47] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [48] ROHC Tunneling Protocol for Source Specific Multicast Architecture
    Sarwar, Muhammad-Imran
    Wan, Tat-Chee
    Keikhosrokiani, Pantea
    Ramadass, Sureswaran
    MATERIAL SCIENCE AND ENGINEERING TECHNOLOGY, 2012, 462 : 881 - +
  • [49] Research of Single Source Application Layer Multicast Protocol
    Zhu, Kunhua
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 117 - 121
  • [50] A lightweight multi-source IP multicast protocol
    Chen Yue
    Huang Pingchuan
    Cheng Pu
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1419 - 1423