Skip to main content

The Adaptive Multicast Data Origin Authentication Protocol

  • Conference paper
Frontiers in Internet Technologies

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 401))

  • 993 Accesses

Abstract

Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the efficiency of a protocol such as the time delay and the overhead. So adjusting the parameters adaptively to achieve the ideal state with the dynamic network is necessary. To achieve a high authentication rate and adapt to the changeable and unstable network environment, we proposed a multicast data origin authentication protocol which is adaptive depending on the packet error rates as well as the time delay, and is robust against the packet loss and injection. Our model can estimate a more appropriate packet error rate and make the time delay lower according to the feedback values got from the receivers using the Markov chain so that it can be adaptive. This strategy is especially efficient in terms of not only the adaptation of dynamic network but also the shortcut of overhead and delay.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proc. IEEE Symposium on Security and Privacy, pp. 227–240 (2002)

    Google Scholar 

  2. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  3. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: Proc. IEEE Symposium on Security and Privacy, p. 241 (2004)

    Google Scholar 

  4. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Authenticated error-correcting codes with applications to multicast authentication. In: Proc. ACM Trans. Inf. Syst. Secur. (2010)

    Google Scholar 

  5. Li, Y., Zhang, M., Guo, Y., Xu, G.: Optimized source authentication scheme for multicast based on Merkle Tree and TESLA. In: Proc. Information Theory and Information Security (ICITIS), pp. 195–198 (2010)

    Google Scholar 

  6. Ahmadzadeh, S.A., Agnew, G.B.: Poster: a geometric approach for multicast authentication in adversarial channels. In: Proc. ACM Conference on Computer and Communications Security, pp. 729–732 (2011)

    Google Scholar 

  7. Liu, Y., Li, J., Guizani, M.: PKC Based Broadcast Authentication using Signature Amortization for WSNs. In: Proc. IEEE Transactions on Wireless Communications, pp. 2106–2115 (2012)

    Google Scholar 

  8. Balasubramanian, K., Roopa, R.: HTSS: Hash Tree Signature Scheme for Multicast Authentication. In: Proc. International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012), pp. 28–32 (2012)

    Google Scholar 

  9. Tang, H., Zhu, L.: Efficient packet-injection resistant data source authentication protocol for group communication. Proc. Journal on Communications 11A, 96–100 (2008)

    Google Scholar 

  10. Fei, G., Hu, G.: Unicast network loss tomography based on k-th order Markov chain. Proc. Journal of Electronics & Information Technology 33(9), 2278–2282 (2011)

    Article  Google Scholar 

  11. Yang, H., Zhu, L.: The application of data origin authentication to video multicast communication. In: Proc. International Conference on Multimedia Technology (ICMT), July 26-28, pp. 5129–5132 (2011)

    Google Scholar 

  12. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Proc. J. ACM, 335–348 (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, L., Yang, H., Yang, Z. (2013). The Adaptive Multicast Data Origin Authentication Protocol. In: Su, J., Zhao, B., Sun, Z., Wang, X., Wang, F., Xu, K. (eds) Frontiers in Internet Technologies. Communications in Computer and Information Science, vol 401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53959-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53959-6_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53958-9

  • Online ISBN: 978-3-642-53959-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics