Signing the First Packet in Amortization Scheme for Multicast Stream Authentication
نویسندگان
چکیده
Signature amortization schemes have been introduced for authenticating multicast streams, in which, a single signature is amortized over several packets. The hash value of each packet is computed, some hash values are appended to other packets, forming what is known as hash chain. These schemes divide the stream into blocks, each block is a number of packets, the signature packet in these schemes is either the first or the last packet of the block. Amortization schemes are efficient solutions in terms of computation and communication overhead, specially in real-time environment. The main effictive factor of amortization schemes is it’s hash chain construction. Some studies show that signing the first packet of each block reduces the receiver’s delay and prevents DoS attacks, other studies show that signing the last packet reduces the sender’s delay. To our knowledge, there is no studies that show which is better, to sign the first or the last packet in terms of authentication probability and resistance to packet loss. In th is paper we will introduce another scheme for authenticating multicast streams that is robust against packet loss, reduces the overhead, and prevents the DoS attacks experienced by the receiver in the same time. Our scheme-The Multiple Connected Chain signing the First packet (MCF) is to append the hash values of specific packets to other packets,then append some hashes to the signature packet which is sent as the first packet in the block. This scheme is aspecially efficient in terms of receiver’s delay. We discuss and evaluate the performance of our proposed scheme against those that sign the last packet of the block. Keywords—multicast stream authentication, hash chain construction, signature amortization, authentication probability.
منابع مشابه
A Multicast Packet Authentication using Signature Amortization Scheme
The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, wh...
متن کاملA graph-theoretical analysis of multicast authentication
Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The techniques of hash chaining and signature amortization have been proposed in many schemes for stream authentication, with or without multicast settings. However, none of them is optimal. They either have a large packet overhead or are not robust to packet loss. Some eve...
متن کاملEfficient Multicast Stream Authentication for the Fully Adversarial Network Model
We consider the stream authentication problem when an adversary has the ability to drop, reorder or inject data inthe network. We propose a coding approach for multicast stream authentication using the list-decoding property of Reed-Solomon codes. We divide the data to be authenticated into a stream of packets and associate a single trapdoor hashcollision for every λn packets wh...
متن کاملEfficient Authentication and Signing of Multicast Streams over Lossy Channels
Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous authentication of radio and TV Internet broadcasts, and authenticated data distribution by satellite. The main challenges are fourfold. First, authenticity must be guaranteed even when only the sender of the data is trusted. Second, the scheme needs to scale to potentially mi...
متن کاملEfficient Multicast Packet Authentication
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite challenging problem for many reasons. First, the a...
متن کامل