An Efficient Multicast Source Authentication Protocol

被引:1
|
作者
WANG Weidong~ 1
2. College of Computer Science and Technology
机构
关键词
source authentication; multi-tree-chains; multicast;
D O I
暂无
中图分类号
TP393.04 [];
学科分类号
081201 ; 1201 ;
摘要
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.
引用
收藏
页码:1831 / 1834
页数:4
相关论文
共 50 条
  • [31] An efficient authentication protocol for mobile communications
    Cheng-Chi Lee
    I-En Liao
    Min-Shiang Hwang
    Telecommunication Systems, 2011, 46 : 31 - 41
  • [32] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [33] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [34] An efficient authentication protocol for GSM networks
    Hwang, MS
    Tang, YL
    Lee, CC
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 326 - 329
  • [35] An efficient authentication protocol for mobile communications
    Lee, Cheng-Chi
    Liao, I-En
    Hwang, Min-Shiang
    TELECOMMUNICATION SYSTEMS, 2011, 46 (01) : 31 - 41
  • [36] A Secure and Efficient Deniable Authentication Protocol
    Xin Xiangjun
    Chen Dongsheng
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 172 - 175
  • [37] Efficient verification of a multicast protocol for mobile computing
    Santone, A. (antonella.santone@iet.unipi.it), 1600, Oxford University Press (44):
  • [38] An Efficient Multicast routing protocol for mobile hosts
    Choi, M
    On, BW
    Baik, H
    Park, MS
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 226 - 231
  • [39] A fast and efficient explicit multicast routing protocol
    Bag-Mohammadi, M
    Yazdani, B
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (10) : 4000 - 4007
  • [40] Efficient verification of a multicast protocol for mobile computing
    Anastasi, G
    Bartoli, A
    De Francesco, N
    Santone, A
    COMPUTER JOURNAL, 2001, 44 (01): : 21 - 30