A2Cast:: an adaptive source authentication protocol for multiCAST streams

被引:0
|
作者
Challal, Y [1 ]
Bettahar, H [1 ]
Bouabdallah, A [1 ]
机构
[1] Univ Technol Compiegne, Heudiasyc Lab, F-60206 Compiegne, France
关键词
source authentication; adaptive hashchaining; non-repudiation; multicast; streaming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many group-oriented applications require authenticating the source of the received traffic, such as broadcasting stock quotes and video-conferencing and hence source authentication is an important component in the whole multicast security architecture. Multicast source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be important in volume (streaming). Besides, multicast source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery. In this paper we propose a new adaptive and efficient source authentication protocol which tolerates pocket loss and guarantees non-repudiation for multicast flows. Me have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.
引用
收藏
页码:363 / 368
页数:6
相关论文
共 50 条
  • [1] Authenticast: a source authentication protocol for multicast flows and streams
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 175 - 178
  • [2] Adaptive Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    Sharma, Amit Kumar
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1308 - 1313
  • [3] An Efficient Multicast Source Authentication Protocol
    WANG Weidong~ 1
    2. College of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1831 - 1834
  • [4] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221
  • [5] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [6] Multicast source authentication for limited devices
    Lundberg, Janne
    Candolin, Catharina
    Kari, Hannu
    WSEAS Transactions on Computers, 2005, 4 (04): : 385 - 390
  • [7] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [8] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [9] New Real Time Multicast Authentication Protocol
    Abdellatif, R.
    Aslan, H. K.
    Elramly, S. H.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 245 - +
  • [10] New real time multicast authentication protocol
    Abdellatif, Riham
    Aslan, Heba K.
    Elramly, Salwa H.
    International Journal of Network Security, 2011, 12 (01) : 13 - 20