29th Annual IEEE International Conference on Local Computer Networks
DOI: 10.1109/lcn.2004.48
|View full text |Cite
|
Sign up to set email alerts
|

Efficient multicast source authentication using layered hash-chaining scheme

Abstract: Abstract-In this paper, we propose an efficient multicast source authentication protocol based on a novel layered hash-chaining scheme. Our protocol tolerates packet loss and guarantees non-repudiation of media-streaming origin. Furthermore, our protocol allows receivers to make the decision regarding the authentication information redundancy degree depending on the quality of reception in term of packet loss ratio. This novel technique allows to save bandwidth since the packet loss distribution over a large s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Hash-chain signature schemes are particularly appealing for lowpowered devices due to the reduced resource burden of traditional signature schemes, which have lead to several protocols incorporating their use [3,8,5,38]. Our hash-chain-based authentication method is somewhat similar to Server-Supported Signatures (S 3 ) scheme [3].…”
Section: Ack Authenticationmentioning
confidence: 99%
“…Hash-chain signature schemes are particularly appealing for lowpowered devices due to the reduced resource burden of traditional signature schemes, which have lead to several protocols incorporating their use [3,8,5,38]. Our hash-chain-based authentication method is somewhat similar to Server-Supported Signatures (S 3 ) scheme [3].…”
Section: Ack Authenticationmentioning
confidence: 99%
“…Within each packet, the sender includes the signed block hash, the packet ID, and the hashes of siblings of all the nodes in the current packet's path to the root [2]. Each receiver first computes the hash of the received packet.…”
Section: Figure 1 Hashing Treementioning
confidence: 99%