[go: up one dir, main page]

Skip to main content

Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication

  • Conference paper
High Speed Networks and Multimedia Communications (HSNMC 2004)

Abstract

Multicast source authentication is an important component in the multicast security framework. This security service must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be important in volume (streaming). Besides, multicast source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery.

In this paper, we propose an adaptive and efficient source authentication protocol which tolerates packet loss and guarantees non-repudiation in media-streaming. This protocol relies on a new hybrid hash-chaining scheme. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bergadano, F., Cavagnino, D., Crispo, B.: Individual Single Source Authentication on the MBone. In: IEEE International Conference on Multimedia and Expo (2000)

    Google Scholar 

  2. Borella, M., Swider, D., Uludag, S., Brewster, G.: Internet packet loss: Measurement and implications for end-to-end qos. In: International Conference on Parallel Processing (August 1998)

    Google Scholar 

  3. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M.: Multicast Security: A taxonomy and Efficient Constructions. In: INFOCOM (1999)

    Google Scholar 

  4. Eastlake, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1), RFC 3174 (September 2001)

    Google Scholar 

  5. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. Information and Computation 165(1), 100–116 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  6. Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001: The Network and Distributed System Security Symposium (2001)

    Google Scholar 

  7. Hardjono, T., Tsudik, G.: IP Multicast Security: Issues and Directions. Annales de telecom (2000)

    Google Scholar 

  8. Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network, 30–36 (January/February 2003)

    Google Scholar 

  9. Kaliski, B.: The MD2 Message-Digest Algorithm, RFC 1319 (April 1992)

    Google Scholar 

  10. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC 2104

    Google Scholar 

  11. Miner, S., Staddon, J.: Graph-Based Authentication of Digital Streams. In: IEEE Symposium on Security and Privacy (2001)

    Google Scholar 

  12. Park, J.M., Chong, E.K.P.,, H.: J Siegel. Efficient Multicast Packet Authentication Using Signature Amortization. In: IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  13. Paxson, V.: End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking 7(3), 277–292 (1999)

    Article  Google Scholar 

  14. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  15. Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: The 8th ACM Conference on Computer and Communications Security (November 2001)

    Google Scholar 

  16. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5 (Summer 2002)

    Google Scholar 

  17. Federal Information Processing Standards Publication. Digital Signature Standard (DSS) (May 1994) FIPS PUB 186

    Google Scholar 

  18. Rivest, R.: The MD5 Message-Digest Algorithm (April 1992) RFC 1321

    Google Scholar 

  19. Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

  20. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications (July 2003) RFC 3550

    Google Scholar 

  21. Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4) (August 1999)

    Google Scholar 

  22. Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and Modeling of the Temporal Dependence in Packet Loss. In: INFOCOM 1999, pp. 345–352 (March 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Challal, Y., Bettahar, H., Bouabdallah, A. (2004). Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. In: Mammeri, Z., Lorenz, P. (eds) High Speed Networks and Multimedia Communications. HSNMC 2004. Lecture Notes in Computer Science, vol 3079. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25969-5_98

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25969-5_98

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22262-0

  • Online ISBN: 978-3-540-25969-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics