H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming
نویسندگان
چکیده
Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important in volume (streaming). Besides, multicast data source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery. In this paper, we propose a hybrid hash-chaining scheme in conjunction with an adaptive and efficient data source authentication protocol which tolerates packet loss and guarantees non-repudiation of media-streaming origin. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent data source authentication protocols.
منابع مشابه
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication
Many group-oriented applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. As multicast groups size may be very large and the exchanged data volume may be important (streaming), a source authentication scheme should take i...
متن کاملAMLCC : Adaptive Multi-Layer Connected Chains mechanism for multicast sender authentication of media-streaming
One of the main issues in securing multicast communication is the source authentication service. In this work we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead, computing efficiency and robustness against packet loss are important parameters to b...
متن کاملRLH: receiver driven layered hash-chaining for multicast data origin authentication
Securing the multicast communication model is a strategic requirement for effective deployment of large scale business multi-party applications (TV over Internet, Video-on-Demand (VoD), video-conferencing, interactive group games, .). One of the main issues in securing multicast communication is the authentication service; a keystone of every secure architecture. Even though several authenticat...
متن کاملSecurity Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining
Hash chaining provides a cost effective means with a realtime streaming application which needs to support data origin authentication and integrity protection in multicast. To reduce the cost of digital signature including both the computation and the communication overhead in some stream authentication schemes [1]–[4], the source generates an amortizing signature over a set of packets called a...
متن کاملVideo Streaming Authentication over Lossy Channels
We consider the problem of source and content authentication in video streaming applications in multicast satellite networks. In particular we propose a novel method which combines signature amortization by means of hash chain with watermarking techniques. This approach does not introduce bandwidth overhead and computational overhead is reduced using signature amortization by means of an hash c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 24 شماره
صفحات -
تاریخ انتشار 2005