Abstract
This paper proposes an efficient authentication scheme for multicast packets using Recovery Information in Signature (RIS) to provide source authentication. The problems of the existing schemes are as follows: TESLA requires time synchronization between the sender and the receiver, and hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication, and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non- repudiation of the origin, immediate verification, and robustness against DoS attack on the receiver.
This work was supported by KOREA SCIENCE & ENGINEERING FOUNDATION (F01-2003-000-00012-0)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. IEEE Network 17(1), 30–36 (2003)
Al-Ibrahim, M., Pieprzyk, J.: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 239–249. Springer, Heidelberg (2001)
Perrig, A., Canetti, R., Tygar, J.D.: Dawn Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Security and Privacy Symposium S&P 2000 (2000)
Perrig, Canetti, Song, Tygar, Briscoe: TESLA: Multicast Source Authentication Transform Introduction, IETF MSEC WG draft-ietf-msec-tesla-intro-00.txt (2002)
Karlof, C.: http://www.cs.berkeley.edu/~ckarlof/research/multicast-security/related.html
Canetti, R., et al.: Multicast Security: A Taxonomy and Efficient Constructions. In: IEEE INFOCOM, New York (1999)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Wong, C., Lam, S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. Net. 7 (1999)
Cucinotta, T., Cecchetti, G., Ferraro, G.: Adopting redundancy techniques for multicast stream authentication. In: Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 (2003)
Karlstedt, M.: Secure Multicast in the Internet, Seminar on Network Security, http://www.cs.helsinki.fi/u/asokan/distsec/documents/karlstedt.ps.gz
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, K., Jung, S. (2004). An Efficient Authentication Scheme Using Recovery Information in Signature. In: Lopez, J., Qing, S., Okamoto, E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30191-2_40
Download citation
DOI: https://doi.org/10.1007/978-3-540-30191-2_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23563-7
Online ISBN: 978-3-540-30191-2
eBook Packages: Springer Book Archive