Authenticast: a source authentication protocol for multicast flows and streams

被引:0
|
作者
Challal, Yacine [1 ]
Bouabdallah, Abdelmadjid [1 ]
机构
[1] Univ Technol Compiegne, Heudiasyc Lab, F-60206 Compiegne, France
关键词
Source Authentication; Non-repudiation; Multicast Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source authentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simulated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [1] A2Cast:: an adaptive source authentication protocol for multiCAST streams
    Challal, Y
    Bettahar, H
    Bouabdallah, A
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 363 - 368
  • [2] An Efficient Multicast Source Authentication Protocol
    WANG Weidong~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1831 - 1834
  • [3] Efficient multicast source authentication protocol and simulation
    Huang, Xin-Yang
    Yang, Ming
    Lu, Shan-Shan
    [J]. Xitong Fangzhen Xuebao / Journal of System Simulation, 2007, 19 (10): : 2216 - 2221
  • [4] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [5] Adaptive Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    Sharma, Amit Kumar
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1308 - 1313
  • [6] Multicast source authentication for limited devices
    Lundberg, Janne
    Candolin, Catharina
    Kari, Hannu
    [J]. WSEAS Transactions on Computers, 2005, 4 (04): : 385 - 390
  • [7] New Real Time Multicast Authentication Protocol
    Abdellatif, R.
    Aslan, H. K.
    Elramly, S. H.
    [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 245 - +
  • [8] New real time multicast authentication protocol
    Abdellatif, Riham
    Aslan, Heba K.
    Elramly, Salwa H.
    [J]. International Journal of Network Security, 2011, 12 (01) : 13 - 20
  • [9] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    [J]. Journal of Central South University, 2013, 20 : 2741 - 2746
  • [10] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    [J]. Journal of Central South University, 2013, 20 (10) : 2741 - 2746