{"title":"基于自适应哈希树的组播通信系统源认证机制","authors":"Vicky Vikrant, Hariom Tyagi","doi":"10.1109/ICCCIS48478.2019.8974510","DOIUrl":null,"url":null,"abstract":"An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Source Authentication Mechanism for Multicast Communication System Using Adaptive Hash Tree\",\"authors\":\"Vicky Vikrant, Hariom Tyagi\",\"doi\":\"10.1109/ICCCIS48478.2019.8974510\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.\",\"PeriodicalId\":436154,\"journal\":{\"name\":\"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCIS48478.2019.8974510\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS48478.2019.8974510","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Source Authentication Mechanism for Multicast Communication System Using Adaptive Hash Tree
An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.