A graph-theoretical analysis of multicast authentication
نویسنده
چکیده
Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The techniques of hash chaining and signature amortization have been proposed in many schemes for stream authentication, with or without multicast settings. However, none of them is optimal. They either have a large packet overhead or are not robust to packet loss. Some even have a large receiver delay and/or require a large receiver buffer size. These schemes are constructed based on ad hoc or trial-and-error methods. There lack tools to evaluate and compare their performances. There is no systematic way to construct these schemes either. In this paper, we introduce the notion of dependence-graphs which links these hash-chained schemes to the well-known graph theory, and provides an effective analytical tool to evaluate the performance of these schemes in the presence of packet loss. Many important metrics of a hash-chained authentication scheme can be readily and easily determined from the properties of its dependence-graph. As well, a dependencegraph demonstrates the design tradeoff between pairs of metrics. In fact, the application of dependence-graphs is not limited to analyzing hash-chained schemes, we show that with slight modifications a dependence-graph can be used to evaluate the performance of TESLA, a very efficient MAC-based scheme. Dependence-graphs also provide insights into constructing and optimizing hash-chained schemes.
منابع مشابه
Interference-Aware and Cluster Based Multicast Routing in Multi-Radio Multi-Channel Wireless Mesh Networks
Multicast routing is one of the most important services in Multi Radio Multi Channel (MRMC) Wireless Mesh Networks (WMN). Multicast routing performance in WMNs could be improved by choosing the best routes and the routes that have minimum interference to reach multicast receivers. In this paper we want to address the multicast routing problem for a given channel assignment in WMNs. The channels...
متن کاملComputational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by algorithmic problems in the domain of information security, we study the complexity of a new class of computations over sets of elements. In this paper, we introduce hierarchical data processing, a generic class of problems for which, broadly speaking, the computation of a collection of output values from an input set of n elements is fully described by a directed acyclic graph (DA...
متن کاملSecure Authentication of Multicast protocol for Ad-Hoc Networks
multicast stream authentication and signing is an important and challenging problem.applications such astroop coordination in a combat field, situational awareness, etc.the main challenges are fourfold.first,authenticity must be guaranteed even when only the sender of the data is trusted. Second, unguaranteed connectivity to trusted authorities make known solutions for wired and single hop wire...
متن کاملAn Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS
It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive...
متن کاملA Dynamic Mechanism for Distributed Optimization of Overlay Multicast Tree
To enhance the performance of overlay multicast networks, the overlay multicast tree should be optimized. This optimization problem is a minimum diameter, degree-limited spanning tree (MDDLST) problem which is known to be NP-Hard. We present a new scheme to optimize an overlay multicast tree dynamically. Our algorithm can adapt the tree structure to the dynamic membership and network situation....
متن کامل