Efficient DoS resistant multicast authentication schemes

被引:0
|
作者
Jeong, J
Park, Y
Cho, Y
机构
[1] Seoul Natl Univ, Sch Engn & Comp Sci, Seoul 151742, South Korea
[2] Hanyang Univ, Coll Informat & Commun, Seoul 133791, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2 | 2005年 / 3481卷
关键词
network security; authentication; multicast network;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To enable widespread commercial stream services, authentication is an important and challenging problem. As for multicast authentication, recently proposed schemes well-operate in adversarial network environment where an enemy can inject a large amount of invalid packets to choke the decoding process in the receivers, at the expense of a large communication overhead. In this paper, we present two efficient DoS resistant multicast authentication algorithms. To detect DoS attack, they require loose time-syncronization or delay of sending the packets, respectively. Compared with the previous schemes, they have much lower communication overhead and smaller computation cost on the receivers.
引用
收藏
页码:353 / 362
页数:10
相关论文
共 50 条
  • [1] Staggered TESLA: A multicast authentication scheme resistant to DoS attacks
    Li, Q
    Trappe, W
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1670 - 1675
  • [2] Efficient non-repudiation multicast source authentication schemes
    Xianxian Li
    Jinpeng Huai
    Journal of Computer Science and Technology, 2002, 17 : 820 - 829
  • [3] Efficient non-repudiation multicast source authentication schemes
    Li, XX
    Huai, JP
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06) : 820 - 829
  • [4] Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks
    Dass, Prajnamaya
    Saha, Pranay Kumar
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 28 - 61
  • [5] An Efficient Multicast Source Authentication Protocol
    WANG Weidong~ 1
    2. College of Computer Science and Technology
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1831 - 1834
  • [6] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435
  • [7] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [8] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [9] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [10] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221