Skip to main content

Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters

  • Conference paper
Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

Abstract

We propose an efficient multicast source authentication protocol called Chains of Iso-hash Clusters scheme (CIC), which shows more lossy resistibility, less communication cost, less average delay at receivers. The CIC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through CIC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: 1) dramatically improves the resistance to burst packets loss, 2) low computation and communication overhead, 3) imposes low delay on the sender side and no delay on the receiver side, assuming no loss occurs.

This work is supported by National Science Foundation of China under grant No.605731120.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ballardie, T.: Scalable Multicast Key Distribution, RFC 1949 (May 1996)

    Google Scholar 

  2. Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Transactions on Networking 7, 502–513 (1999)

    Article  Google Scholar 

  3. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  4. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (May 2000)

    Google Scholar 

  5. Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceeding of 10th Annual Network and Distributed System Security Symposium (February 2003)

    Google Scholar 

  6. Paxson, V.: End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking 7, 277–292 (1999)

    Article  Google Scholar 

  7. Perrig, R.C.A., Song, D., Tygar, D.: Effcient and secure source authentication for multicast. In: Proceedings Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA (February 2001)

    Google Scholar 

  8. Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001: The Network and Distributed System Security Symposium (2001)

    Google Scholar 

  9. Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy, May 2001, pp. 232–246 (2001)

    Google Scholar 

  10. Jung Min, P., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 227–240 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Z., Wang, W., Zhang, Y., Li, W. (2006). Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_38

Download citation

  • DOI: https://doi.org/10.1007/11839569_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics