New multicast authentication protocol for entrusted members using advanced encryption standard

被引:2
|
作者
Abouhogail, Reham Abdellatif [1 ]
机构
[1] Natl Inst Stand, Elect Quant Metrol Dept, Cairo, Egypt
关键词
Component; Multicast; Authentication; Digital signature;
D O I
10.1016/j.ejrs.2011.11.003
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Today there is a widening in digital technologies and increasing in new multimedia services like: pay-per-view TV, interactive simulations, teleconferencing. So there is an increasing demand for multicast communication. There is a number of security issues in multicast communication directly related to the specific nature of multicast. In this paper, we propose a new scheme for authenticating streamed data delivered in real-time over an insecure network, and we concentrate on the multicast authentication problem. Important requirements of multicast communication protocols are: to perform authentication in real-time, to resist packet loss and to have low communication and computation overheads. In this paper, a new multicast authentication scheme is proposed. It is suitable for real time applications. It uses the advanced encryption standard algorithm to solve the problem of entrusted members. This scheme uses the idea of the new index number each time the member sends certain block of packets in the multicast group. (C) 2011 National Authority for Remote Sensing and Space Sciences. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:121 / 128
页数:8
相关论文
共 50 条
  • [31] Advanced Real Time RFID Mutual Authentication Protocol Using Dynamically Updated Secret Value Through Encryption And Decryption Process
    Risalat, Nure Alam Md.
    Hasan, Md. Tanvir
    Hossain, Md. Shahadat
    Rahman, Md. Mahbubur
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 788 - 793
  • [32] Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1076 - 1081
  • [34] A New Hardware Implementation of The Advanced Encryption Standard Algorithm for Automotive Applications
    Cassettari, Riccardo
    Fanucci, Luca
    Boccini, Giorgio
    2014 10TH CONFERENCE ON PH.D. RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME 2014), 2014,
  • [35] A New Chaos Advanced Encryption Standard (AES) Algorithm for Data Security
    ElBadawy, El-Sayed Abdoul-Moaty
    El-Masry, Waleed A.
    Mokhtar, Amro
    Hafez, Alaa El-Din Sayed
    INTERNATIONAL CONFERENCE ON SIGNALS AND ELECTRONIC SYSTEMS (ICSES '10): CONFERENCE PROCEEDINGS, 2010, : 405 - 408
  • [36] BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm
    Castillo, Reynaldo E.
    Cayabyab, Gerald T.
    Castro, Paula Jean M.
    Rachel Aton, Ma.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 117 - 121
  • [37] An improved proxy re-encryption scheme using resource optimization and authentication protocol
    Burra, Vijaya Babu
    Pachala, Sunitha
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [38] Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
    Tunstall, Michael
    Mukhopadhyay, Debdeep
    Ali, Subidh
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 224 - 233
  • [39] Advanced Encryption Standard (AES) Security Enhancement using Hybrid Approach
    D'souza, Flevina Jonese
    Panchal, Dakshata
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 647 - 652
  • [40] Efficient advanced encryption standard implementation using lookup and normal basis
    Burns, F.
    Murphy, J.
    Koelmans, A.
    Yakovlev, A.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2009, 3 (03): : 270 - 280