A hybrid and efficient scheme of multicast source authentication

被引:3
|
作者
Jin-xin, He [1 ,2 ]
Gao-chao, Xu [1 ]
Xiao-dong, Fu [1 ]
Zhi-guo, Zhou [1 ,3 ]
机构
[1] Jilin Univ, Coll Sci & Technol, Changchun, Peoples R China
[2] Jilin Univ, Coll Earth, Changchun, Peoples R China
[3] Northeast Normal Univ, Coll Comp, Changchun, Peoples R China
关键词
D O I
10.1109/SNPD.2007.176
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Source authentication is the most important and difficult problem in multicast security, and no schemes can satisfy all multicast applications. So a Hybrid Multicast Source Authentication (HMSA) scheme was proposed based on two data structures: hashing tree and hashing chain. Compared with some other schemes in computation and communication overheads, HMSA is simple, efficient and secure.
引用
收藏
页码:123 / +
页数:2
相关论文
共 50 条
  • [41] MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks
    Eltaief, Hamdi
    El Kamel, Ali
    Youssef, Habib
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2023,
  • [42] Hybrid local recovery scheme for reliable multicast using Group-Aided Multicast scheme
    Fung, Alex
    Sasase, Iwao
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3481 - 3485
  • [43] Hybrid and adaptive hash-chaining scheme for data-streaming source authentication
    Challal, Y
    Bettahar, H
    Bouabdallah, A
    HIGH SPEED NETWORKS AND MULTIMEDIA COMMUNICATIONS, PROCEEDINGS, 2004, 3079 : 1056 - 1067
  • [44] Efficient mechanism for source mobility in source specific multicast
    Lee, Hoyoung
    Han, Sunyoung
    Hong, Jin Pyo
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 82 - 91
  • [45] A Hybrid Graphical User Authentication Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415
  • [46] A hybrid watermarking scheme for video authentication
    Liu, Hongmei
    Zhu, Ling
    Huang, Jiwu
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2569 - +
  • [47] Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    Lo, Nai-Wei
    Tung, Shao-Wei
    Dai, Wen-Yan
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 358 - 367
  • [48] Efficient approximate message authentication scheme
    Jiang, Shaoquan
    Li, Jue
    Liao, Yongjian
    IET INFORMATION SECURITY, 2018, 12 (01) : 100 - 106
  • [49] An efficient authentication scheme with revocation capability
    Department of Information Management, Chinese Culture University, 55, Hwa-Kang Road, Yang-Ming-Shan, Taipei , Taiwan
    WSEAS Trans. Inf. Sci. Appl., 2007, 6 (1263-1268):
  • [50] MTBF: An efficient multicast group aggregation scheme for the global area multicast
    Song, SJ
    Zhang, ZL
    Choi, BY
    Du, DHC
    10TH IEEE WORKSHOP ON LOCAL AND METROPOLITAN AREA NETWORKS, SELECTED PAPERS: EVOLVING ACCESS AND NETWORKING TECHNIQUES, 2001, : 85 - 94