MABS: Multicast Authentication Based on Batch Signature

被引:21
|
作者
Zhou, Yun [1 ]
Zhu, Xiaoyan [2 ]
Fang, Yuguang [3 ,4 ]
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 10071, Shaanxi, Peoples R China
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[4] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Multimedia; multicast; authentication; signature; SECURITY; ISSUES;
D O I
10.1109/TMC.2010.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. We also present an enhanced scheme MABS-E, which combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact while preserving the perfect resilience to packet loss.
引用
收藏
页码:982 / 993
页数:12
相关论文
共 50 条
  • [21] On batch rekeying based on membership dynamics model of multicast
    Qu, J
    Ge, JH
    Jiang, M
    Zhang, Z
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 145 - 147
  • [22] Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
    Wang, Qiyan
    Khurana, Himanshu
    Huang, Ying
    Nahrstedt, Klara
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1233 - 1241
  • [23] Signature Authentication
    Nista, Elizabeth
    BIOLOGY OF BLOOD AND MARROW TRANSPLANTATION, 2013, 19 (02) : S170 - S170
  • [24] Knapsack based ECC for digital signature authentication
    Rajaram, R.
    Prabakar, M. Amutha
    Devi, M. Indra
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 384 - 392
  • [25] A Visualization Based Approach for Digital Signature Authentication
    Xu, Songhua
    Yang, Wenxia
    Lau, Francis C. M.
    COMPUTER GRAPHICS FORUM, 2009, 28 (03) : 935 - 942
  • [26] A new approach to signature-based authentication
    Gluhchev, Georgi
    Savov, Mladen
    Boumbarov, Ognian
    Vasileva, Diana
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 594 - +
  • [27] An authentication scheme for multicast networks
    Srinivasan, R.
    Vaidehi, V.
    Arvind, S.
    Krishnakumar, A. C.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 344 - +
  • [28] The ForwardDiffSig Scheme for Multicast Authentication
    Berbecaru, Diana
    Albertalli, Luca
    Lioy, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (06) : 1855 - 1868
  • [29] Adaptive Multicast Source Authentication
    Singh, Karan
    Yadav, Rama Shankar
    Sharma, Amit Kumar
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1308 - 1313
  • [30] A COHERENT AUTHENTICATION FRAMEWORK FOR MOBILE COMPUTING BASED ON HOMOMORPHIC SIGNATURE AND IMPLICIT AUTHENTICATION
    Mohammed, Hamdun
    Fati, Suliman Mohamed
    Ponnusamy, Vasaki
    Yaik, Ooi Boon
    Annur, Robithoh
    Yue, Liew Soung
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 426 - 434