Abstract
We propose an efficient multicast source authentication protocol called Chains of Iso-hash Clusters scheme (CIC), which shows more lossy resistibility, less communication cost, less average delay at receivers. The CIC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through CIC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: 1) dramatically improves the resistance to burst packets loss, 2) low computation and communication overhead, 3) imposes low delay on the sender side and no delay on the receiver side, assuming no loss occurs.
This work is supported by National Science Foundation of China under grant No.605731120.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ballardie, T.: Scalable Multicast Key Distribution, RFC 1949 (May 1996)
Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Transactions on Networking 7, 502–513 (1999)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (May 2000)
Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceeding of 10th Annual Network and Distributed System Security Symposium (February 2003)
Paxson, V.: End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking 7, 277–292 (1999)
Perrig, R.C.A., Song, D., Tygar, D.: Effcient and secure source authentication for multicast. In: Proceedings Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA (February 2001)
Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001: The Network and Distributed System Security Symposium (2001)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy, May 2001, pp. 232–246 (2001)
Jung Min, P., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 227–240 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Z., Wang, W., Zhang, Y., Li, W. (2006). Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_38
Download citation
DOI: https://doi.org/10.1007/11839569_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38619-3
Online ISBN: 978-3-540-38622-3
eBook Packages: Computer ScienceComputer Science (R0)