Efficient multicast source authentication protocol and simulation

被引:0
|
作者
Huang, Xin-Yang
Yang, Ming
Lu, Shan-Shan
机构
[1] Institute of Command Automation, PLA University of Science and Technology, Nanjing 210007, China
[2] Military Deputy to Shanghai Station of Air Force, Shanghai 200083, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
An efficient triggered multicast source authentication protocol was put forward. This protocol can offer higher utilization ratio of key and lower communication overload, which remain problems in TESLA. The probabilistic resilient multicast scheme was combined to reduce the authentication delay and packet loss in network. Simulation results show that this protocol possesses the same performances with TESLA under the condition of intensive broadcast rates. However, under the condition of sparse or random broadcast rates, it can improve utilization ratio of key by about 36 times and reduce the communication overloads by about 5.1 times than TESLA, and this performance will be further increased with lower of broadcast rates.
引用
收藏
页码:2216 / 2221
相关论文
共 50 条
  • [31] Efficient packet-injection resistant data source authentication protocol for group communication
    Tang, Hong
    Zhu, Lie-Huang
    Li, Jian
    Cao, Rui-Qiang
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 96 - 100
  • [32] An efficient authentication protocol for mobile communications
    Cheng-Chi Lee
    I-En Liao
    Min-Shiang Hwang
    Telecommunication Systems, 2011, 46 : 31 - 41
  • [33] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [34] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [35] An efficient authentication protocol for GSM networks
    Hwang, MS
    Tang, YL
    Lee, CC
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 326 - 329
  • [36] An efficient authentication protocol for mobile communications
    Lee, Cheng-Chi
    Liao, I-En
    Hwang, Min-Shiang
    TELECOMMUNICATION SYSTEMS, 2011, 46 (01) : 31 - 41
  • [37] A Secure and Efficient Deniable Authentication Protocol
    Xin Xiangjun
    Chen Dongsheng
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 172 - 175
  • [38] Efficient verification of a multicast protocol for mobile computing
    Santone, A. (antonella.santone@iet.unipi.it), 1600, Oxford University Press (44):
  • [39] An Efficient Multicast routing protocol for mobile hosts
    Choi, M
    On, BW
    Baik, H
    Park, MS
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 226 - 231
  • [40] A fast and efficient explicit multicast routing protocol
    Bag-Mohammadi, M
    Yazdani, B
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (10) : 4000 - 4007