Efficient multicast source authentication protocol and simulation

被引:0
|
作者
Huang, Xin-Yang
Yang, Ming
Lu, Shan-Shan
机构
[1] Institute of Command Automation, PLA University of Science and Technology, Nanjing 210007, China
[2] Military Deputy to Shanghai Station of Air Force, Shanghai 200083, China
来源
Xitong Fangzhen Xuebao / Journal of System Simulation | 2007年 / 19卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
An efficient triggered multicast source authentication protocol was put forward. This protocol can offer higher utilization ratio of key and lower communication overload, which remain problems in TESLA. The probabilistic resilient multicast scheme was combined to reduce the authentication delay and packet loss in network. Simulation results show that this protocol possesses the same performances with TESLA under the condition of intensive broadcast rates. However, under the condition of sparse or random broadcast rates, it can improve utilization ratio of key by about 36 times and reduce the communication overloads by about 5.1 times than TESLA, and this performance will be further increased with lower of broadcast rates.
引用
收藏
页码:2216 / 2221
相关论文
共 50 条
  • [41] Efficient verification of a multicast protocol for mobile computing
    Anastasi, G
    Bartoli, A
    De Francesco, N
    Santone, A
    COMPUTER JOURNAL, 2001, 44 (01): : 21 - 30
  • [42] Verifications of RMP: An efficient reliable multicast protocol
    Jia, WJ
    Nett, E
    Cao, JN
    Kaiser, J
    SECOND INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN '96), PROCEEDINGS, 1996, : 388 - 393
  • [43] An Efficient Multicast Hybrid Routing Protocol for MANETs
    Sethi, Srinivas
    Udgata, Siba K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 22 - +
  • [44] Efficient multicast stream authentication for the fully adversarial network model
    Tartary, C
    Wang, HX
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 108 - 125
  • [45] Efficient authentication and signing of multicast streams over lossy channels
    Perrig, A
    Canetti, R
    Tygar, JD
    Song, D
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 56 - 73
  • [46] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
    Younis, Mohamed
    Farrag, Osama
    Althouse, Bryan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
  • [47] A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy
    Chang, Chin-Chen
    Cheng, Ting-Fang
    FUNDAMENTA INFORMATICAE, 2014, 131 (02) : 167 - 186
  • [48] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [49] ROHC Tunneling Protocol for Source Specific Multicast Architecture
    Sarwar, Muhammad-Imran
    Wan, Tat-Chee
    Keikhosrokiani, Pantea
    Ramadass, Sureswaran
    MATERIAL SCIENCE AND ENGINEERING TECHNOLOGY, 2012, 462 : 881 - +
  • [50] Research of Single Source Application Layer Multicast Protocol
    Zhu, Kunhua
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 117 - 121