Abstract
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the efficiency of a protocol such as the time delay and the overhead. So adjusting the parameters adaptively to achieve the ideal state with the dynamic network is necessary. To achieve a high authentication rate and adapt to the changeable and unstable network environment, we proposed a multicast data origin authentication protocol which is adaptive depending on the packet error rates as well as the time delay, and is robust against the packet loss and injection. Our model can estimate a more appropriate packet error rate and make the time delay lower according to the feedback values got from the receivers using the Markov chain so that it can be adaptive. This strategy is especially efficient in terms of not only the adaptation of dynamic network but also the shortcut of overhead and delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proc. IEEE Symposium on Security and Privacy, pp. 227–240 (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. IEEE Symposium on Security and Privacy, pp. 56–73 (2000)
Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: Proc. IEEE Symposium on Security and Privacy, p. 241 (2004)
Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Authenticated error-correcting codes with applications to multicast authentication. In: Proc. ACM Trans. Inf. Syst. Secur. (2010)
Li, Y., Zhang, M., Guo, Y., Xu, G.: Optimized source authentication scheme for multicast based on Merkle Tree and TESLA. In: Proc. Information Theory and Information Security (ICITIS), pp. 195–198 (2010)
Ahmadzadeh, S.A., Agnew, G.B.: Poster: a geometric approach for multicast authentication in adversarial channels. In: Proc. ACM Conference on Computer and Communications Security, pp. 729–732 (2011)
Liu, Y., Li, J., Guizani, M.: PKC Based Broadcast Authentication using Signature Amortization for WSNs. In: Proc. IEEE Transactions on Wireless Communications, pp. 2106–2115 (2012)
Balasubramanian, K., Roopa, R.: HTSS: Hash Tree Signature Scheme for Multicast Authentication. In: Proc. International Conference on Recent Trends in Computational Methods, Communication and Controls (ICON3C 2012), pp. 28–32 (2012)
Tang, H., Zhu, L.: Efficient packet-injection resistant data source authentication protocol for group communication. Proc. Journal on Communications 11A, 96–100 (2008)
Fei, G., Hu, G.: Unicast network loss tomography based on k-th order Markov chain. Proc. Journal of Electronics & Information Technology 33(9), 2278–2282 (2011)
Yang, H., Zhu, L.: The application of data origin authentication to video multicast communication. In: Proc. International Conference on Multimedia Technology (ICMT), July 26-28, pp. 5129–5132 (2011)
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Proc. J. ACM, 335–348 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, L., Yang, H., Yang, Z. (2013). The Adaptive Multicast Data Origin Authentication Protocol. In: Su, J., Zhao, B., Sun, Z., Wang, X., Wang, F., Xu, K. (eds) Frontiers in Internet Technologies. Communications in Computer and Information Science, vol 401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53959-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-53959-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53958-9
Online ISBN: 978-3-642-53959-6
eBook Packages: Computer ScienceComputer Science (R0)