Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.3.63

An Efficient Authentication Scheme for Multicast Packet using Recovery Layer  

홍기훈 (숭실대학교)
정수환 (숭실대학교)
Abstract
This paper proposes an efficient authentication scheme for multicast packet using recovery layer to provide source authentication. The problems of the existing schemes are as follows : TESLA requires time synchronization between the sender and the receiver, md hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non-repudiation of the origin, immediate verification and robustness against DoS attack on the receiver.
Keywords
Parker authentication; Multicast; Recovery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ Chris Karlof ] /
2 TESLA:Multicast Source Authentication Transform Introduction /
[ Perrig;Canetti;Song;Tygar;Briscoe ] / IETF MSEC WG draft-ietf-msec-tesla-intro-00.txt
3 Security issues and solutions in multicast content distribution:a survey /
[ Judge,P.;Ammar,M. ] / IEEE Network
4 Efficient Authentication and Signing of Multicast Streams over Lossy Channels /
[ Adrian Perring;Ran Canetti;J.D.Tygar;Dawn Song ] / Proc. of IEEE Security and Privancy Symposium S&P 2000
5 Digital Signatures for Flows and Multicasts /
[ C.Wong;S.Lam ] / IEEE/ACM Trans. Net.
6 Multicast Securit y:A Taxonomy and Efficient Constructions /
[ R.Canetti(et al.) ] / IEEE INFOCOM
7 Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques /
[ Mohamed Al-Ibrahim;Josef Pieprzyk ] / ICN 2001, LNCS 2094
8 Efficient multicast stream authentication using erasure codes /
[ Jung Min Park;Edwin,K.P.Chong;Howard Jay Siegel ] / ACM Transactions on Information and System Security   DOI
9 How to Sign Digital Streams /
[ R.Gennaro;P.Rohatgi ] / LNCS