Authenticast: a source authentication protocol for multicast flows and streams

被引:0
|
作者
Challal, Yacine [1 ]
Bouabdallah, Abdelmadjid [1 ]
机构
[1] Univ Technol Compiegne, Heudiasyc Lab, F-60206 Compiegne, France
关键词
Source Authentication; Non-repudiation; Multicast Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source authentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simulated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
引用
收藏
页码:175 / 178
页数:4
相关论文
共 50 条
  • [31] Resource requirement analysis for a predictive-hashing based multicast authentication protocol
    Choi, Seonho
    Kim, Yanggon
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 302 - 311
  • [32] New multicast authentication protocol for entrusted members using advanced encryption standard
    Abouhogail, Reham Abdellatif
    [J]. EGYPTIAN JOURNAL OF REMOTE SENSING AND SPACE SCIENCES, 2011, 14 (02): : 121 - 128
  • [33] Integrating Encryption Technique in Authentication of Multicast Protocol for Ad-Hoc Networks
    Devasia, Tintu
    Visakh, R.
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 423 - 426
  • [34] A New Multicast Authentication Protocol using Erasure Code Functions and Signcryption Techniques
    Aslan, Heba
    Rasslan, Mohamed
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 99 - +
  • [35] AuthoCast-a mobility-compliant protocol framework for multicast sender authentication
    Schmidt, Thomas C.
    Waehlisch, Matthias
    Christ, Olaf
    Hege, Gabriel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (06) : 495 - 509
  • [36] Multicast group authentication
    Mukherjee, Ritesh
    Atwood, J. William
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, IV, 2007, 229 : 215 - +
  • [37] CMSM - A closed multi-source IP multicast protocol
    Chen, Y
    Wang, N
    Li, YF
    Lan, JL
    [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 435 - 441
  • [38] Integrated method for loss-resilient multicast source authentication and data reconstruction
    Mori, Tatsuya
    Tode, Hideki
    Murakami, Koso
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5844 - 5848
  • [39] Efficient multicast source authentication using layered hash-chaining scheme
    Challal, Y
    Bouabdallah, A
    Hinard, Y
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 411 - 412
  • [40] A chained multicast source authentication technology based on the threshold cryptography in a noisy channel
    School of Aerospace Science and Technology, Xidian University, Xi'an
    710126, China
    不详
    710071, China
    [J]. Dianzi Yu Xinxi Xuebao, 5 (1227-1233):