Abstract
Multicast source authentication is an important component in the multicast security framework. This security service must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be important in volume (streaming). Besides, multicast source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery.
In this paper, we propose an adaptive and efficient source authentication protocol which tolerates packet loss and guarantees non-repudiation in media-streaming. This protocol relies on a new hybrid hash-chaining scheme. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bergadano, F., Cavagnino, D., Crispo, B.: Individual Single Source Authentication on the MBone. In: IEEE International Conference on Multimedia and Expo (2000)
Borella, M., Swider, D., Uludag, S., Brewster, G.: Internet packet loss: Measurement and implications for end-to-end qos. In: International Conference on Parallel Processing (August 1998)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M.: Multicast Security: A taxonomy and Efficient Constructions. In: INFOCOM (1999)
Eastlake, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1), RFC 3174 (September 2001)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. Information and Computation 165(1), 100–116 (2001)
Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001: The Network and Distributed System Security Symposium (2001)
Hardjono, T., Tsudik, G.: IP Multicast Security: Issues and Directions. Annales de telecom (2000)
Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network, 30–36 (January/February 2003)
Kaliski, B.: The MD2 Message-Digest Algorithm, RFC 1319 (April 1992)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC 2104
Miner, S., Staddon, J.: Graph-Based Authentication of Digital Streams. In: IEEE Symposium on Security and Privacy (2001)
Park, J.M., Chong, E.K.P.,, H.: J Siegel. Efficient Multicast Packet Authentication Using Signature Amortization. In: IEEE Symposium on Security and Privacy (2002)
Paxson, V.: End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking 7(3), 277–292 (1999)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy (2000)
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: The 8th ACM Conference on Computer and Communications Security (November 2001)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5 (Summer 2002)
Federal Information Processing Standards Publication. Digital Signature Standard (DSS) (May 1994) FIPS PUB 186
Rivest, R.: The MD5 Message-Digest Algorithm (April 1992) RFC 1321
Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications (July 2003) RFC 3550
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4) (August 1999)
Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and Modeling of the Temporal Dependence in Packet Loss. In: INFOCOM 1999, pp. 345–352 (March 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Challal, Y., Bettahar, H., Bouabdallah, A. (2004). Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. In: Mammeri, Z., Lorenz, P. (eds) High Speed Networks and Multimedia Communications. HSNMC 2004. Lecture Notes in Computer Science, vol 3079. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25969-5_98
Download citation
DOI: https://doi.org/10.1007/978-3-540-25969-5_98
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22262-0
Online ISBN: 978-3-540-25969-5
eBook Packages: Springer Book Archive