Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.6.765

Authentication Mechanism for Efficient Multicast Service  

Jung Yumi (이화여자대학교 과학기술대학원 컴퓨터학과)
Par Jung-Min (이화여자대학교 과학기술대학원 컴퓨터학과)
Chae Kijoon (이화여자대학교 컴퓨터학과)
Lee Sang-Ho (이화여자대학교 컴퓨터학과)
Nah Jaehoon (한국전자통신연구원)
Abstract
Multicast communication is simultaneous transmission of data to multiple receivers and saves considerably sender resources and network bandwidth. It has high risk to attack using group address and inherent complexity of routing packets to a large group of receivers. It is therefore critical to provide source authentication, allowing a receiver to ensure that received data is authentic. In this paper, we propose the multiple chain authentication scheme for secure and efficient multicast stream. To evaluate the performance of our scheme, we compare our technique with two other previously proposed schemes using simulation results. Our scheme provides non-repudiation of origin, low overhead by amortizing the signature operation over multiple packets, and high packet loss resistance.
Keywords
Multicast; Authentication; Security; Source Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Borella, D. Swider, S. Uludag and G. Brewster, 'Internet Packet Loss: Measurement and Implications for End-to-End QoS,' In Proc. of the International Conference on Parallel Processing, pp.3-15, 1998   DOI
2 V. Paxson, 'End-to-End Internet Packet Dynamics,' IEEE/ACM Trans. on Networking, Vol.12, No.5, pp.277-292, 1999   DOI   ScienceOn
3 'The Network Simulator : ns-2,' http://www.isi.edu/nsnam/ns/
4 'Crypto++,' http://www.eskimo.com./~weidai/cryptlib.html
5 R. L. Rivest, 'The MD5 Message Digest Algorithm,' RFC 1321, 1992
6 W. Stalling, Network Security Essentials: Application and Standards, Prentice Hall, 2001
7 A. Perrig, 'The BiBa One-Time Signature and Broadcast Authentication Protocol,' ACM Conference on Computer and Communications Security, pp.28-37, 2001
8 P. Rohatgi, 'A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,' Proc. of ACM Conference on Computer and Communications Security, Nov., 1999   DOI
9 R. Merkel, 'A Certified Digital Signature,' Advanced in Cryptology(CRYPTO '89), pp.218-238, Aug., 1989
10 A. Perrig, R. Canetti, J. D. Tygar and D. Song, 'Efficient Authentication and Signing of Multicast Streams over Lossy Channels,' Proc. of IEEE Symposium on Security and Privacy, pp.56-73, May, 2000
11 C. K. Wong and S. S. Lam, 'Digital Signatures for Flows and Multicasts,' IEEE Trans. on Networking, Vol.7, No.4, pp.502-513, Aug., 1999   DOI   ScienceOn
12 R. L. Rivest, A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signatures and Public Key Cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978   DOI   ScienceOn
13 A. Perrig, R. Canetti, D. Song, D. Tygar and B. Briscoe, 'TESLA : Multicast Source Authentication Transform Introduction,' Internet draft, IETF, 2002
14 A. Perrig, R. Canetti and B. Whillock, 'TESLA: Multicast Source Authentication Transform Specification,' Internet draft, IETF, 2002
15 C. Diot, B. N. Levine, B. Lyles, H. Kassem, D. Balensiefen, 'Deployment Issues for the IP Multicast Service and Architecture,' IEEE Network, Vol.14, pp.88-98, Jan., 2000   DOI   ScienceOn
16 R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, 'Multicast Security: A Taxonomy and Some Efficient Constructions,' INFOCOM'99, Vol.2, pp.708-716, Mar., 1999   DOI
17 A. Perrig, R. Canetti, D. Song and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast,' Proceedings of Network and Distributed System Security Symposium(NDSS) 2001, Feb., 2001
18 B. Quinn, K. Almeroth, 'IP Multicast Application: Challenges and Solutions,' RFC3170, Sep., 2001