RLH: receiver driven layered hash-chaining for multicast data origin authentication

نویسندگان

  • Yacine Challal
  • Abdelmadjid Bouabdallah
  • Yoann Hinard
چکیده

Securing the multicast communication model is a strategic requirement for effective deployment of large scale business multi-party applications (TV over Internet, Video-on-Demand (VoD), video-conferencing, interactive group games, .). One of the main issues in securing multicast communication is the authentication service; a keystone of every secure architecture. Even though several authentication mechanisms have existed so far, data origin authentication in multi-party communications remains a challenging problem in terms of scalability, efficiency and performance. In this paper, we propose an efficient multicast data origin authentication protocol based on a novel layered hash-chaining scheme. Our protocol tolerates packet loss and guarantees non-repudiation of media-streaming origin. Furthermore, our protocol allows receivers to make the decision regarding the authentication information redundancy degree depending on the quality of reception in term of packet loss ratio. This novel technique allows to save bandwidth since the packet loss distribution over a large scale network is likely to be not uniform. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent data origin authentication protocols. q 2005 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining

Hash chaining provides a cost effective means with a realtime streaming application which needs to support data origin authentication and integrity protection in multicast. To reduce the cost of digital signature including both the computation and the communication overhead in some stream authentication schemes [1]–[4], the source generates an amortizing signature over a set of packets called a...

متن کامل

H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming

Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...

متن کامل

AMLCC : Adaptive Multi-Layer Connected Chains mechanism for multicast sender authentication of media-streaming

One of the main issues in securing multicast communication is the source authentication service. In this work we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead, computing efficiency and robustness against packet loss are important parameters to b...

متن کامل

A graph-theoretical analysis of multicast authentication

Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The techniques of hash chaining and signature amortization have been proposed in many schemes for stream authentication, with or without multicast settings. However, none of them is optimal. They either have a large packet overhead or are not robust to packet loss. Some eve...

متن کامل

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication

Many group-oriented applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. As multicast groups size may be very large and the exchanged data volume may be important (streaming), a source authentication scheme should take i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2005