Dynamic Security Scheme for Multicast Source Authentication

被引:2
|
作者
Singh, Karan [1 ]
Yadav, Rama Shankar [2 ]
机构
[1] Gautam Buddha Univ, Greater Noida, UP, India
[2] Motilal Nehru Natl Inst Technol, Allahabad, Uttar Pradesh, India
关键词
Security mechanim; Chaining; Hash; Security level;
D O I
10.1016/j.protcy.2012.05.082
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multicast source authentication is a burning issues in multicast communication because multicast technology provide the better communication than unicast and broadcast. But its design architecture any member can send the data to all joined receivers due to publicly available IP address of group manager. To solve this hottest problems, several schemes have been existed in this category such as simple hash chaining, tree hash chaining where the attacker intensity are unchanged. In this paper, we are going to propose a improved mechanism for multicast source authentication which adapts the security level deployed based on threshold value of attack success rate. The results shows that propose approach dynamic security mechanism in multicast at minimum communication and computation overhead (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of C3IT
引用
收藏
页码:515 / 521
页数:7
相关论文
共 50 条
  • [1] A Lightweight Dynamic Multicast Authentication Scheme
    Yao, Xuanxia
    Zhou, Xianwei
    Du, Xiaojiang
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2014, : 595 - 600
  • [2] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    [J]. Journal of Central South University, 2013, 20 : 2741 - 2746
  • [3] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    [J]. Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [4] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [5] A hybrid and efficient scheme of multicast source authentication
    Jin-xin, He
    Gao-chao, Xu
    Xiao-dong, Fu
    Zhi-guo, Zhou
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 123 - +
  • [8] An authentication scheme for multicast networks
    Srinivasan, R.
    Vaidehi, V.
    Arvind, S.
    Krishnakumar, A. C.
    [J]. 2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 344 - +
  • [9] The ForwardDiffSig Scheme for Multicast Authentication
    Berbecaru, Diana
    Albertalli, Luca
    Lioy, Antonio
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1855 - 1868
  • [10] A source authentication scheme based on message recovery digital signature for multicast
    Yang, Jen-Ho
    Lin, Iuon-Chang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2616 - 2627