Efficient Multicast Packet Authentication Using Signature Amortization
نویسندگان
چکیده
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required to authenticate the packets. Our approach is to encode the hash values and the signatures with Rabin’s Information Dispersal Algorithm (IDA) to construct an authentication scheme that amortizes a single signature operation over multiple packets. This strategy is especially efficient in terms of space overhead, because just the essential elements needed for authentication (i.e., one hash per packet and one signature per group of packets) are used in conjunction with an erasure code that is space optimal. To evaluate the performance of our scheme, we compare our technique with four other previously proposed schemes using analytical and empirical results. Two different bursty loss models are considered in the analyses.
منابع مشابه
Signing the First Packet in Amortization Scheme for Multicast Stream Authentication
Signature amortization schemes have been introduced for authenticating multicast streams, in which, a single signature is amortized over several packets. The hash value of each packet is computed, some hash values are appended to other packets, forming what is known as hash chain. These schemes divide the stream into blocks, each block is a number of packets, the signature packet in these schem...
متن کاملA Multicast Packet Authentication using Signature Amortization Scheme
The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, wh...
متن کاملVideo Streaming Authentication over Lossy Channels
We consider the problem of source and content authentication in video streaming applications in multicast satellite networks. In particular we propose a novel method which combines signature amortization by means of hash chain with watermarking techniques. This approach does not introduce bandwidth overhead and computational overhead is reduced using signature amortization by means of an hash c...
متن کاملMulticast Authentication using Batch Signature - MABS
Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: Choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends to packet loss which is very common via internet and wireless com...
متن کاملA graph-theoretical analysis of multicast authentication
Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The techniques of hash chaining and signature amortization have been proposed in many schemes for stream authentication, with or without multicast settings. However, none of them is optimal. They either have a large packet overhead or are not robust to packet loss. Some eve...
متن کامل