Authenticast: a source authentication protocol for multicast flows and streams

نویسندگان

  • Yacine Challal
  • Abdelmadjid Bouabdallah
چکیده

The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source authentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simulated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category. Keywords—Source Authentication, Non-repudiation,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming

Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...

متن کامل

Efficient Multicast Packet Authentication

Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite challenging problem for many reasons. First, the a...

متن کامل

Resource Control and Authentication for a Video Streaming Service in a DiffServ/IP Multicast Network

With IP multicast, a sender can transmit identical data streams to a group of receivers along a multicast tree. Resource reservations generate extra cost and should therefore be limited to that part of a multicast tree that contains authorised (paying) users only. This paper presents a concept that allows Internet Service Providers (ISPs) to authenticate anonymous users of a video distribution ...

متن کامل

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP)

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes the use of t...

متن کامل

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)

TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005