A hybrid and efficient scheme of multicast source authentication

被引:3
|
作者
Jin-xin, He [1 ,2 ]
Gao-chao, Xu [1 ]
Xiao-dong, Fu [1 ]
Zhi-guo, Zhou [1 ,3 ]
机构
[1] Jilin Univ, Coll Sci & Technol, Changchun, Peoples R China
[2] Jilin Univ, Coll Earth, Changchun, Peoples R China
[3] Northeast Normal Univ, Coll Comp, Changchun, Peoples R China
关键词
D O I
10.1109/SNPD.2007.176
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Source authentication is the most important and difficult problem in multicast security, and no schemes can satisfy all multicast applications. So a Hybrid Multicast Source Authentication (HMSA) scheme was proposed based on two data structures: hashing tree and hashing chain. Compared with some other schemes in computation and communication overheads, HMSA is simple, efficient and secure.
引用
收藏
页码:123 / +
页数:2
相关论文
共 50 条
  • [31] An efficient stream authentication scheme
    Park, Yongsu
    Cho, Yookun
    IEICE Transactions on Information and Systems, 2003, E86-D (04) : 704 - 711
  • [32] An efficient stream authentication scheme
    Park, Y
    Cho, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (04): : 704 - 711
  • [33] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [34] Secure and Efficient Authentication and Key Agreement Scheme for Multicast Services in 5G Vehicular to Everything
    Zhang, Yinghui
    Li, Guoteng
    Han, Gang
    Cao, Jin
    Zheng, Dong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (07): : 3026 - 3035
  • [35] Authenticast: a source authentication protocol for multicast flows and streams
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 175 - 178
  • [36] Staggered TESLA: A multicast authentication scheme resistant to DoS attacks
    Li, Q
    Trappe, W
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1670 - 1675
  • [37] Efficient multicast packet authentication using signature amortization
    Park, JM
    Chong, EKP
    Siegel, HJ
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 227 - 240
  • [38] A Robust Multicast Authentication Scheme Based on Asymmetric Key Signature
    Christianah, Opayinka A.
    Boniface, Alese K.
    Aderonke, Thompson F.
    Olufunso, Alowolodu D.
    Festus, Osuolale A.
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 449 - 458
  • [39] MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks
    Eltaief, Hamdi
    El Kamel, Ali
    Youssef, Habib
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2024, 8 (01) : 33 - 56
  • [40] Handover Optimised Authentication Scheme for High Mobility Wireless Multicast
    Mapoka, Trust T.
    Shepherd, Simon J.
    Abd-Alhameed, Raed
    Anoh, Kelvin O. O.
    2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2015, : 526 - 531