Authenticast: A Source Authentication Protocol for Multicast Flows and Streams
The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077034Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1180
 F. Bergadano, D. Cavagnino, and B. Crispo. Individual Sin- gle Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo, 2000.
 Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, and Moni Naor. Multicast Security: A taxonomy and Efficient Con- structions. INFOCOM, 1999.
 Rosario Gennaro and Pankaj Rohatgi. How to Sign Digital Streams. Information and Computation, 165(1):100-116, Febru- ary 2001.
 Sara Miner and Jessica Staddon. Graph-Based Authentication of Digital Streams. IEEE Symposium on Security and Privacy, 2001.
 J. M. Park, E. K. P. Chong, and H. J Siegel. Efficient Multicast Packet Authentication Using Signature Amortization. IEEE Symposium on Security and Privacy, 2002.
 Vern Paxson. End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking, 7(3):277-292, June 1999.
 A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Efficient Au- thentication and Signing of Multicast Streams over Lossy Chan- nels. IEEE Symposium on Security and Privacy, 2000.
 Adrian Perrig. The BiBa One-Time Signature and Broadcast Authentication Protocol. The 8th ACM Conference on Com- puter and Communications Security, November 2001.
 Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5, Summer 2002.
 Nagendra Modadugu Philippe Golle. Authenticating Streamed Data in the Presence of Random Packet Loss. NDSS-01: The Network and Distributed System Security Symposium, 2001.
 Chung Kei Wong and Simon S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Network- ing, 7(4), August 1999.
 Maya Yajnik, Sue Moon, Jim Kurose, and Don Towsley. Mea- surement and Modeling of the Temporal Dependence in Packet Loss. INFOCOM-99, pages 345-352, March 1999.