Abstract
In this paper, we consider the problem of authentication of multicast data. The TESLA scheme was introduced to provide data authentication for multicast communication over lossy channels. Later, TESLA was further improved to offer immediate authentication of packets and fortifications against denial-of-service attacks. The improved TESLA scheme is efficient and applicable to mobile resource-constrained receivers for authentication of multicast data. The resource limitation of mobile resource-constrained receivers gives additional challenges to multicast authentication. In this paper, a denial-of-service attack called the Random-Substitution attack is presented. We present a new scheme that can provide immediate packet authentication and deter the Random-Substitution attack. It is also robust against packet losses. In addition, the new scheme allows a receiver to immediately authenticate all packets upon arrival, when the receiver joins the multicast communication. Hence, the new scheme offers a practical multicast authentication solution for resource-constrained receivers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haller, N.: The S/KEY one-time password system. Request for Comments (Informational) 1760, Internet Engineering Task Force (February 1995)
Lamport, L.: Password authentication with insecure communication. ACM Commun. 24(11) ( November 1981)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Symposium on Security and Privacy (2000)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and Secure Source Authentication for Multicast. In: Proc. of NDSS 2001 (2001)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun. 21(2), 120–126 (1978)
U. S. National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS), Federal Register 56. FIPS PUB 186 (August 1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wong, C.K., Chan, A. (2005). Immediate Data Authentication for Multicast in Resource Constrained Network. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_10
Download citation
DOI: https://doi.org/10.1007/11506157_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)