Signing the First Packet in Amortization Scheme for Multicast Stream Authentication

نویسندگان

  • Mohammed Shatnawi
  • Qusai Abuein
  • Susumu Shibusawa
چکیده

Signature amortization schemes have been introduced for authenticating multicast streams, in which, a single signature is amortized over several packets. The hash value of each packet is computed, some hash values are appended to other packets, forming what is known as hash chain. These schemes divide the stream into blocks, each block is a number of packets, the signature packet in these schemes is either the first or the last packet of the block. Amortization schemes are efficient solutions in terms of computation and communication overhead, specially in real-time environment. The main effictive factor of amortization schemes is it’s hash chain construction. Some studies show that signing the first packet of each block reduces the receiver’s delay and prevents DoS attacks, other studies show that signing the last packet reduces the sender’s delay. To our knowledge, there is no studies that show which is better, to sign the first or the last packet in terms of authentication probability and resistance to packet loss. In th is paper we will introduce another scheme for authenticating multicast streams that is robust against packet loss, reduces the overhead, and prevents the DoS attacks experienced by the receiver in the same time. Our scheme-The Multiple Connected Chain signing the First packet (MCF) is to append the hash values of specific packets to other packets,then append some hashes to the signature packet which is sent as the first packet in the block. This scheme is aspecially efficient in terms of receiver’s delay. We discuss and evaluate the performance of our proposed scheme against those that sign the last packet of the block. Keywords—multicast stream authentication, hash chain construction, signature amortization, authentication probability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multicast Packet Authentication using Signature Amortization Scheme

The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, wh...

متن کامل

A graph-theoretical analysis of multicast authentication

Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The techniques of hash chaining and signature amortization have been proposed in many schemes for stream authentication, with or without multicast settings. However, none of them is optimal. They either have a large packet overhead or are not robust to packet loss. Some eve...

متن کامل

Efficient Multicast Stream Authentication for the Fully Adversarial Network Model

We consider the stream authentication problem when an adversary has the ability to drop, reorder or inject data inthe network. We propose a coding approach for multicast stream authentication using the list-decoding property of Reed-Solomon codes. We divide the data to be authenticated into a stream of packets and associate a single trapdoor hashcollision for every λn packets wh...

متن کامل

Efficient Authentication and Signing of Multicast Streams over Lossy Channels

Multicast stream authentication and signing is an important and challenging problem. Applications include the continuous authentication of radio and TV Internet broadcasts, and authenticated data distribution by satellite. The main challenges are fourfold. First, authenticity must be guaranteed even when only the sender of the data is trusted. Second, the scheme needs to scale to potentially mi...

متن کامل

Efficient Multicast Packet Authentication

Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite challenging problem for many reasons. First, the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009