{"title":"在有损信道上有效的发送方身份验证和多播流签名","authors":"Hamdi Eltaief, H. Youssef","doi":"10.1109/AICCSA.2010.5586962","DOIUrl":null,"url":null,"abstract":"Multicast communication is becoming the basis for a growing number of applications. Therefore, securing multicast communication is a strategic requirement for effective deployment of large scale business multi-party applications. One of the main issues in securing multicast communication is the source authentication service. We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. In this paper we present an efficient multicast source authentication mechanism based on a multi-layer connected chain structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. Simulation results show significant improvements over mechanisms in the same category.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Efficient sender authentication and signing of multicast streams over lossy channels\",\"authors\":\"Hamdi Eltaief, H. Youssef\",\"doi\":\"10.1109/AICCSA.2010.5586962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multicast communication is becoming the basis for a growing number of applications. Therefore, securing multicast communication is a strategic requirement for effective deployment of large scale business multi-party applications. One of the main issues in securing multicast communication is the source authentication service. We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. In this paper we present an efficient multicast source authentication mechanism based on a multi-layer connected chain structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. Simulation results show significant improvements over mechanisms in the same category.\",\"PeriodicalId\":352946,\"journal\":{\"name\":\"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICCSA.2010.5586962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICCSA.2010.5586962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient sender authentication and signing of multicast streams over lossy channels
Multicast communication is becoming the basis for a growing number of applications. Therefore, securing multicast communication is a strategic requirement for effective deployment of large scale business multi-party applications. One of the main issues in securing multicast communication is the source authentication service. We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. In this paper we present an efficient multicast source authentication mechanism based on a multi-layer connected chain structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. Simulation results show significant improvements over mechanisms in the same category.