A2Cast:: an adaptive source authentication protocol for multiCAST streams

被引:0
|
作者
Challal, Y [1 ]
Bettahar, H [1 ]
Bouabdallah, A [1 ]
机构
[1] Univ Technol Compiegne, Heudiasyc Lab, F-60206 Compiegne, France
来源
ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2004年
关键词
source authentication; adaptive hashchaining; non-repudiation; multicast; streaming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many group-oriented applications require authenticating the source of the received traffic, such as broadcasting stock quotes and video-conferencing and hence source authentication is an important component in the whole multicast security architecture. Multicast source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be important in volume (streaming). Besides, multicast source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery. In this paper we propose a new adaptive and efficient source authentication protocol which tolerates pocket loss and guarantees non-repudiation for multicast flows. Me have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.
引用
收藏
页码:363 / 368
页数:6
相关论文
共 50 条
  • [21] Adaptive Core Multicast Routing Protocol
    Sangho Park
    Daeyeon Park
    Wireless Networks, 2004, 10 : 53 - 60
  • [22] Embedding source signature in multicast wireless video streams
    Chessa, Stefano
    Giunta, Gaetano
    Oligeri, Gabriele
    2007 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOL 1, 2007, : 112 - 118
  • [23] Adaptive Multicast Tree Construction for Elastic Data Streams
    Zhu, Ying
    Pu, Ken Q.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [24] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [25] An adaptive protocol for synchronizing media streams
    Rothermel, K
    Helbig, T
    MULTIMEDIA SYSTEMS, 1997, 5 (05) : 324 - 336
  • [26] An adaptive protocol for synchronizing media streams
    Kurt Rothermel
    Tobias Helbig
    Multimedia Systems, 1997, 5 : 324 - 336
  • [27] An Adaptive Reliable Broadcast/Multicast MAC Protocol
    Li, Qing
    Yu, Hongyi
    Zhang, Dalong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3160 - 3164
  • [28] AMRM: Adaptive mobile reliable multicast protocol
    Fan, R
    Zhang, G
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 1546 - 1550
  • [29] Timed verification of the reliable adaptive multicast protocol
    Lai, Richard
    Tsang, Tony
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 224 - 239
  • [30] ARMLCC: Adaptive and Recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication
    Eltaief, Hamdi
    Kamel, Ali Ei
    Youssef, Habib
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2013, : 37 - 42