2008
DOI: 10.1002/sec.86
|View full text |Cite
|
Sign up to set email alerts
|

AuthoCast—a mobility‐compliant protocol framework for multicast sender authentication

Abstract: Mobility is considered a key technology of the next generation Internet and has been standardized within the IETF. Rapidly emerging multimedia group applications such as IPTV, massive mutliplayer games (MMORPGs) and video conferencing increase the demand for mobile group communication, but a standard design of mobile multicast is still awaited. The open problem poses significant operational and security challenges to the Internet infrastructure. This paper introduces a protocol framework for authenticating mul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Updates bear the common risks of impersonation and theft of service in performing redirects on a global scale, and hence require a cryptographically strong authentication. The corresponding security issues are common to all approaches for mobile multicast sources, and have been recently combined in a joint approach called AuthoCast [23].…”
Section: Packet Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Updates bear the common risks of impersonation and theft of service in performing redirects on a global scale, and hence require a cryptographically strong authentication. The corresponding security issues are common to all approaches for mobile multicast sources, and have been recently combined in a joint approach called AuthoCast [23].…”
Section: Packet Designmentioning
confidence: 99%
“…Following a sequence identifier, routers will process updates only once. For a detailed discussion on security aspects and overheads we refer to [23].…”
Section: Packet Designmentioning
confidence: 99%
“…Details can be found in [20] and are omitted here for the sake of brevity. Note that for this 'AuthoCast' group authentication scheme a native implementation for IPv6 exists based on standard protocol elements [21].…”
Section: B Autonomous Sender Authenticationmentioning
confidence: 99%
“…Due to lack of feedback, the admission [85] and binding updates [86] of mobile multicast sources require autonomously verifiable authentication. This can be achieved by, for instance, Cryptographically Generated Addresses (CGAs).…”
Section: Security Considerationsmentioning
confidence: 99%