Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Com 2007
DOI: 10.1109/snpd.2007.176
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid and Efficient Scheme of Multicast Source Authentication

Abstract: Source authentication is the most important and difficult problem in multicast security, and no schemes can satisfy all multicast applications. So a Hybrid Multicast Source Authentication (HMSA) scheme was proposed based on two data structures: hashing tree and hashing chain. Compared with some other schemes in computation and communication overheads, HMSA is simple, efficient and secure.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…In order to increase the efficiency of multicast transmissions, some previously related works attempted to use a hash tree to reduce the computation costs by using the digital signature. The hash tree is constructed by a binary tree , which is shown in Figure . Assume that there are eight packets to be sent, and each leaf node represents the hash value of the corresponding packet.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to increase the efficiency of multicast transmissions, some previously related works attempted to use a hash tree to reduce the computation costs by using the digital signature. The hash tree is constructed by a binary tree , which is shown in Figure . Assume that there are eight packets to be sent, and each leaf node represents the hash value of the corresponding packet.…”
Section: Related Workmentioning
confidence: 99%
“…In this survey, they pointed out that the source authentication for multicast environments has to focus on the confidentiality of each packet. In recent years, various schemes of the source authentication schemes for multicast [5][6][7][8][9][10][11][12] have been proposed to reduce the computation costs. These schemes are based on the hash-chain method, such as simple hash chain [5], multi-hash chain [6][7][8], hash tree [9,10], and Timed Efficient Stream Loss-tolerant Authentication (TESLA) schemes [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…He Jin [19] approach uses the hash tree for decreasing receiver's computation overhead and authenticity because one root hash has the all value of leaf hash. Hash chaining is used for decreasing communication overhead and signing.…”
Section: Multicast Source Authenticationmentioning
confidence: 99%
“…It is assumed that the packets in the highest priority class are spaced evenly throughout the block so that two consecutive packets of the highest priority class are located exactly r packets apart. To reduce the communication overhead of amortization schemes, Park et al proposed SAIDA [20] using Erasure Codes to achieve this goal, but its computation overhead is higher than other schemes based on hashing amortization [1,2,3,[5][6][7][8]11,13,14,21]. …”
Section: Non-repudiationmentioning
confidence: 99%