A hybrid and efficient scheme of multicast source authentication

被引:3
|
作者
Jin-xin, He [1 ,2 ]
Gao-chao, Xu [1 ]
Xiao-dong, Fu [1 ]
Zhi-guo, Zhou [1 ,3 ]
机构
[1] Jilin Univ, Coll Sci & Technol, Changchun, Peoples R China
[2] Jilin Univ, Coll Earth, Changchun, Peoples R China
[3] Northeast Normal Univ, Coll Comp, Changchun, Peoples R China
关键词
D O I
10.1109/SNPD.2007.176
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Source authentication is the most important and difficult problem in multicast security, and no schemes can satisfy all multicast applications. So a Hybrid Multicast Source Authentication (HMSA) scheme was proposed based on two data structures: hashing tree and hashing chain. Compared with some other schemes in computation and communication overheads, HMSA is simple, efficient and secure.
引用
收藏
页码:123 / +
页数:2
相关论文
共 50 条
  • [1] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [2] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [3] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [4] Optimized source authentication scheme for multicast using hybrid tree and chains
    Li, Yang
    Xu, Guoai
    Niu, Xinxin
    Yang, Yixian
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2011, 39 (07): : 50 - 53
  • [5] An Efficient Multicast Source Authentication Protocol
    WANG Weidong~ 1
    2. College of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1831 - 1834
  • [6] Efficient multicast source authentication using layered hash-chaining scheme
    Challal, Y
    Bouabdallah, A
    Hinard, Y
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 411 - 412
  • [7] Dynamic Security Scheme for Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 515 - 521
  • [8] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221
  • [9] EFFICIENT MULTICAST SOURCE ROUTING SCHEME
    CHEN, WT
    SHEU, PR
    CHANG, YR
    COMPUTER COMMUNICATIONS, 1993, 16 (10) : 662 - 666
  • [10] A hybrid scheme for multicast authentication over lossy networks
    Aslan, HK
    COMPUTERS & SECURITY, 2004, 23 (08) : 705 - 713