Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30662
Authenticast: A Source Authentication Protocol for Multicast Flows and Streams

Authors: Yacine Challal, Abdelmadjid Bouabdallah


The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.

Keywords: Multicast Security, source authentication, Non-repudiation

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1183


[1] F. Bergadano, D. Cavagnino, and B. Crispo. Individual Sin- gle Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo, 2000.
[2] Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, and Moni Naor. Multicast Security: A taxonomy and Efficient Con- structions. INFOCOM, 1999.
[3] Rosario Gennaro and Pankaj Rohatgi. How to Sign Digital Streams. Information and Computation, 165(1):100-116, Febru- ary 2001.
[4] Sara Miner and Jessica Staddon. Graph-Based Authentication of Digital Streams. IEEE Symposium on Security and Privacy, 2001.
[5] J. M. Park, E. K. P. Chong, and H. J Siegel. Efficient Multicast Packet Authentication Using Signature Amortization. IEEE Symposium on Security and Privacy, 2002.
[6] Vern Paxson. End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking, 7(3):277-292, June 1999.
[7] A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Efficient Au- thentication and Signing of Multicast Streams over Lossy Chan- nels. IEEE Symposium on Security and Privacy, 2000.
[8] Adrian Perrig. The BiBa One-Time Signature and Broadcast Authentication Protocol. The 8th ACM Conference on Com- puter and Communications Security, November 2001.
[9] Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5, Summer 2002.
[10] Nagendra Modadugu Philippe Golle. Authenticating Streamed Data in the Presence of Random Packet Loss. NDSS-01: The Network and Distributed System Security Symposium, 2001.
[11] Chung Kei Wong and Simon S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Network- ing, 7(4), August 1999.
[12] Maya Yajnik, Sue Moon, Jim Kurose, and Don Towsley. Mea- surement and Modeling of the Temporal Dependence in Packet Loss. INFOCOM-99, pages 345-352, March 1999.