MABS: Multicast Authentication Based on Batch Signature

被引:21
|
作者
Zhou, Yun [1 ]
Zhu, Xiaoyan [2 ]
Fang, Yuguang [3 ,4 ]
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 10071, Shaanxi, Peoples R China
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[4] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Multimedia; multicast; authentication; signature; SECURITY; ISSUES;
D O I
10.1109/TMC.2010.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. We also present an enhanced scheme MABS-E, which combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact while preserving the perfect resilience to packet loss.
引用
收藏
页码:982 / 993
页数:12
相关论文
共 50 条
  • [31] Expertise as a signature: continuous implicit authentication based on behavior
    Sad-Houari Nawal
    Taghezout Noria
    Hadj-Sahraoui Nihad
    Cluster Computing, 2025, 28 (3)
  • [32] Authentication based on feature of hand-written signature
    Shu-ren Zhu
    Journal of Central South University of Technology, 2007, 14 : 563 - 567
  • [33] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [34] SIGNATURE AND IRIS AUTHENTICATION BASED ON DERIVED KINEMATIC VALUES
    Radhika, K. R.
    Sheela, S. V.
    Venkatesha, M. K.
    Sekhar, G. N.
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2010, 24 (08) : 1237 - 1260
  • [35] Authentication based on feature of hand-written signature
    Zhu, Shu-ren
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2007, 14 (04): : 563 - 567
  • [36] Fuzzy identity based signature with applications to biometric authentication
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 532 - 540
  • [37] Offline Signature Authentication Algorithm Based on the Fuzzy Set
    Qiu, Shi
    Fei, Fengchang
    Cui, Ying
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [38] Autoassociative Signature Authentication Based on Recurrent Neural Network
    Rokui, Jun
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, ICAISC 2018, PT I, 2018, 10841 : 88 - 96
  • [39] Dynamic group signature scheme based on network authentication
    Si, Guang-Dong
    Dong, Qing-Kuan
    Yang, Jia-Xi
    Xiao, Guo-Zhen
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2008, 29 (05): : 504 - 508
  • [40] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147