Multicast source authentication for limited devices

被引:0
|
作者
Lundberg, Janne [1 ]
Candolin, Catharina [1 ]
Kari, Hannu [1 ]
机构
[1] Laboratory for Theoretical Computer Science, Helsinki University of Technology, P.O. Box 5400, 02015 HUT Helsinki, Finland
来源
WSEAS Transactions on Computers | 2005年 / 4卷 / 04期
关键词
Electronic document identification systems - Multicasting - Optimization - Packet networks - Security of data - Wireless telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
Multicast has potential to make delivery of large files and streams over the Internet very efficient. However, strong source authentication for multicast is needed to make delivery of important data possible. Information such as stock quotes is valuable only if the data can be trusted. In this paper, we present an architecture which allows wireless mobile devices with limited computational abilities to receive source authenticated multicast over an unreliable wireless access network.
引用
收藏
页码:385 / 390
相关论文
共 50 条
  • [1] Adaptive Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    Sharma, Amit Kumar
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1308 - 1313
  • [2] An Efficient Multicast Source Authentication Protocol
    WANG Weidong~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1831 - 1834
  • [3] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    [J]. Journal of Central South University, 2013, 20 : 2741 - 2746
  • [4] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    [J]. Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [5] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [6] Dynamic Security Scheme for Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 515 - 521
  • [7] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    [J]. Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221
  • [8] A hybrid and efficient scheme of multicast source authentication
    Jin-xin, He
    Gao-chao, Xu
    Xiao-dong, Fu
    Zhi-guo, Zhou
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 123 - +
  • [9] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [10] Authenticast: a source authentication protocol for multicast flows and streams
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 175 - 178