Efficient and secure source authentication scheme for multicast user authentication

被引:3
|
作者
Jeong, Yoon-su [1 ]
Lee, Sang-hyuk [2 ]
Shin, Seung-soo [3 ]
机构
[1] Mokwon Univ, Dept Informat Commun Engn, Taejon 302729, South Korea
[2] Xian Jiaotong Liverpool Univ, Dept Elect & Elect Engn, Suzhou 215123, Peoples R China
[3] Tongmyong Univ, Dept Informat Secur, Pusan 608711, South Korea
关键词
multicast; packet; source authentication; broadband Internet;
D O I
10.1007/s11771-013-1792-4
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.
引用
收藏
页码:2741 / 2746
页数:6
相关论文
共 50 条
  • [31] The ForwardDiffSig Scheme for Multicast Authentication
    Berbecaru, Diana
    Albertalli, Luca
    Lioy, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1855 - 1868
  • [32] An authentication scheme for multicast networks
    Srinivasan, R.
    Vaidehi, V.
    Arvind, S.
    Krishnakumar, A. C.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 344 - +
  • [33] A more efficient and secure dynamic ID-based remote user authentication scheme
    Wang, Yan-yan
    Liu, Jia-yong
    Xiao, Feng-xia
    Dan, Jing
    COMPUTER COMMUNICATIONS, 2009, 32 (04) : 583 - 585
  • [34] Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    Mishra, Dheerendra
    AD HOC NETWORKS, 2017, 54 : 147 - 169
  • [35] A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
    Li, Chun-Ta
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 69 - 76
  • [36] On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1684 - 1686
  • [37] Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
    Zhao, Yan
    Li, Shiming
    Jiang, Liehui
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [38] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [39] An efficient biometric based remote user authentication scheme for secure internet of things environment
    Roy, Sandip
    Chatterjee, Santanu
    Mahapatra, Gautam
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1403 - 1410
  • [40] Weaknesses of an efficient and secure dynamic ID-based remote user authentication scheme
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 351 - 353