790
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      AMLCC : Adaptive Multi-Layer Connected Chains mechanism for multicast sender authentication of media-streaming

      proceedings-article
      ,
      Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010) (VECOS)
      Verification and Evaluation of Computer and Communication Systems (VECoS 2010)
      1-2 July 2010
      Multicast source authentication, Non-repudiation, Packet loss resistance, Authentication probability
      Bookmark

            Abstract

            One of the main issues in securing multicast communication is the source authentication service. In this work we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead, computing efficiency and robustness against packet loss are important parameters to be taken into account when designing a multicast source authentication mechanism. The main contribution of this paper consists of a multicast source authentication mechanism based on an adaptive hash chaining structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. It adapts the redundancy chaining degree (the amount of authentication information) depending on the actual packet loss ratio in the network. Compared to other mechanisms fitting in the same category, NS-2 simulations show that the adaptation of the redundancy degree allows to save bandwidth, allows to increase the robustness to packet loss and generate an authentication delay required by the used application.

            Content

            Author and article information

            Contributors
            Conference
            July 2010
            July 2010
            : 1-11
            Affiliations
            [0001]Research Unit PRINCE

            ISITCom of Hammam Sousse

            Tunisia
            Article
            10.14236/ewic/VECOS2010.11
            c3e16fe1-7041-474d-9b9a-c95a056ee017
            © Hamdi Eltaief et al. Published by BCS Learning and Development Ltd. Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010), Paris, France

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010)
            VECOS
            4
            Paris, France
            1-2 July 2010
            Electronic Workshops in Computing (eWiC)
            Verification and Evaluation of Computer and Communication Systems (VECoS 2010)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/VECOS2010.11
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Multicast source authentication,Non-repudiation,Packet loss resistance,Authentication probability

            Comments

            Comment on this article