A Robust Multicast Authentication Scheme Based on Asymmetric Key Signature

被引:0
|
作者
Christianah, Opayinka A. [1 ]
Boniface, Alese K. [1 ]
Aderonke, Thompson F. [1 ]
Olufunso, Alowolodu D. [1 ]
Festus, Osuolale A. [1 ]
机构
[1] Fed Univ Technol Akure, Dept Comp Sci, Akure, Nigeria
关键词
components: multicast Authentication; Information Dispersal Algorithm; Signature Amortization Technique;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over multiple packets. Authentication scheme for Multicast message packets design was based on signature amortization technique. This reduces the computation overhead and ensures verification when there is packet loss. The design was simulated with a number of messages sent to a chosen number of receivers. Probabilities of loss were calculated for each transmission. The performance was compared with three other existing schemes to ascertain its efficiency. It was observed that our technique is efficient in packets authentication in a lossy environment especially with reduced space overhead.
引用
收藏
页码:449 / 458
页数:10
相关论文
共 50 条
  • [1] A source authentication scheme based on message recovery digital signature for multicast
    Yang, Jen-Ho
    Lin, Iuon-Chang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2616 - 2627
  • [2] A robust and secure signature scheme for video authentication
    Ahmed, Fawad
    Siyal, M. Y.
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2126 - 2129
  • [3] A compact and fast hybrid signature scheme for multicast packet authentication
    Rohatgi, P
    6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 1999, : 93 - 100
  • [4] MABS: Multicast Authentication Based on Batch Signature
    Zhou, Yun
    Zhu, Xiaoyan
    Fang, Yuguang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (07) : 982 - 993
  • [5] Robust secret key based authentication scheme using smart cards
    Yoon, EJ
    Yoo, KY
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 723 - 734
  • [6] A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET
    Lim, Kiho
    Tuladhar, Kastuv M.
    Wang, Xiwei
    Liu, Weihua
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017,
  • [7] A Comment on "MABS: Multicast Authentication Based on Batch Signature"
    Zhu, Wen Tao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (11) : 1775 - 1776
  • [8] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [9] Robust Remote Mutual Authentication Scheme with Key Agreement
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Wu, Tzong-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1283 - 1289
  • [10] Generalized Elliptic Curve Digital Signature Chain based Authentication and Key Agreement Scheme
    Zhang Li-hua
    Zhang Li-ping
    Bai Er-fei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1503 - +