A TAXONOMY OF MULTICAST DATA ORIGIN AUTHENTICATION: ISSUES AND SOLUTIONS

被引:42
作者
Challal, Yacine [1 ]
Bettahar, Hatem [1 ]
Bouabdallah, Abdelmadjid [1 ]
机构
[1] Univ Technol Compiegne, Dept Comp Engn, F-60206 Compiegne, France
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2004年 / 6卷 / 03期
关键词
D O I
10.1109/COMST.2004.5342292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group games, and video on demand. The lack of security obstructs a large deployment of this efficient communication model. This limitation motivated a host of research works that have addressed the many issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity, and access control. Many applications, such as broadcasting stock quotes and video-conferencing, require data origin authentication of the received traffic. Hence, data origin authentication is an important component in the multicast security architecture. Multicast data origin authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be heavy in volume (streaming). Besides, multicast data origin authentication must be robust enough against packet loss because most multicast multimedia applications do not use reliable packet delivery. Therefore, multicast data origin authentication is subject to many concurrent and competitive challenges, when considering these miscellaneous application-level requirements and features. In this article we review and classify recent works dealing with the data origin authentication problem in group communication, and we discuss and compare them with respect to some relevant performance criteria.
引用
收藏
页码:34 / 57
页数:24
相关论文
共 61 条
[1]  
[Anonymous], 1993, FIPS PUB
[2]  
[Anonymous], 1994, FIPS PUB
[3]  
[Anonymous], 2001, FIPS PUB
[4]  
[Anonymous], 2002, CRYPTOBYTES
[5]  
Ballardie T., 1995, Proceedings of the Symposium on Network and Distributed System Security, P2, DOI 10.1109/NDSS.1995.390649
[6]  
BERGADANO F, 2000, IEEE INT C MULT EXP
[7]  
Bleichenbacher D., 1996, STACS 96. 13th Annual Symposium on Theoretical Aspects of Computer Science. Proceedings, P363
[8]  
Bleichenbacher D., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P145, DOI 10.1007/BFb0034843
[9]  
Boneh D, 2001, LECT NOTES COMPUT SC, V2045, P437
[10]  
Canetti R., 1999, INFOCOM