Advertisement

An Efficient Authentication Scheme Using Recovery Information in Signature

  • Kihun Hong
  • Souhwan Jung
Conference paper
  • 688 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3269)

Abstract

This paper proposes an efficient authentication scheme for multicast packets using Recovery Information in Signature (RIS) to provide source authentication. The problems of the existing schemes are as follows: TESLA requires time synchronization between the sender and the receiver, and hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication, and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non- repudiation of the origin, immediate verification, and robustness against DoS attack on the receiver.

Keywords

Packet Loss Communication Overhead Authentication Scheme Authentication Message Packet Loss Probability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. IEEE Network 17(1), 30–36 (2003)CrossRefGoogle Scholar
  2. 2.
    Al-Ibrahim, M., Pieprzyk, J.: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 239–249. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Perrig, A., Canetti, R., Tygar, J.D.: Dawn Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Security and Privacy Symposium S&P 2000 (2000)Google Scholar
  4. 4.
    Perrig, Canetti, Song, Tygar, Briscoe: TESLA: Multicast Source Authentication Transform Introduction, IETF MSEC WG draft-ietf-msec-tesla-intro-00.txt (2002)Google Scholar
  5. 5.
  6. 6.
    Canetti, R., et al.: Multicast Security: A Taxonomy and Efficient Constructions. In: IEEE INFOCOM, New York (1999)Google Scholar
  7. 7.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)Google Scholar
  8. 8.
    Wong, C., Lam, S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. Net. 7 (1999)Google Scholar
  9. 9.
    Cucinotta, T., Cecchetti, G., Ferraro, G.: Adopting redundancy techniques for multicast stream authentication. In: Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 (2003)Google Scholar
  10. 10.
    Karlstedt, M.: Secure Multicast in the Internet, Seminar on Network Security, http://www.cs.helsinki.fi/u/asokan/distsec/documents/karlstedt.ps.gz
  11. 11.
    Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Kihun Hong
    • 1
  • Souhwan Jung
    • 1
  1. 1.School of Electronic EngineeringSoongsil UniversitySeoulKorea

Personalised recommendations