Authenticast: a source authentication protocol for multicast flows and streams
نویسندگان
چکیده
The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source authentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simulated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category. Keywords—Source Authentication, Non-repudiation,
منابع مشابه
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming
Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...
متن کاملEfficient Multicast Packet Authentication
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite challenging problem for many reasons. First, the a...
متن کاملResource Control and Authentication for a Video Streaming Service in a DiffServ/IP Multicast Network
With IP multicast, a sender can transmit identical data streams to a group of receivers along a multicast tree. Resource reservations generate extra cost and should therefore be limited to that part of a multicast tree that contains authorised (paying) users only. This paper presents a concept that allows Internet Service Providers (ISPs) to authenticate anonymous users of a video distribution ...
متن کاملThe Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP)
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes the use of t...
متن کاملBootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)
TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized...
متن کامل