Abstract
This paper aims at providing message authentication service in overlay multicast. Previous work has mostly focused on the network layer IP multicast and not as much work has been done on the application layer overlay multicast. A main feature of overlay multicast is that end systems carry on the responsibility of delivering the multicast traffic. Taking advantage of this feature, this paper presents a new collusion resistant technique, which is based on digital signature, for overlay multicast message authentication. The proposed technique minimizes both the computational cost (through signature amortization) and the communication overhead (using retransmissions and utilizing multiple multicast groups in handling message loss). In addition, it resists denial of service attacks via early dropping of forged messages. A simulation study is conducted to evaluate our proposed technique. Results of the study show that the proposed technique outperforms earlier ones.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Banerjee, S., Kommareddy, C., Kar, K., Bhattacharjee, B., Khuller, S.: OMNI: An Efficient Overlay Multicast Infrastructure for Real-Time Applications. Computer Networks 50(6), 826–841 (2006)
Bolot, J.-C.: End-To-End Packet Delay and Loss Behavior in the Internet. In: Proc. Sigcomm 1993, San Francisco, CA (1993)
Boneh, D., Durfee, G., Franklin, M.: Lower Bounds for Multicast Message Authentication. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 437–452. Springer, Heidelberg (2001)
Chu, Y., Rao, S., Seshan, S., Zhang, H.: Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture. In: Proc. of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, San Diego, CA, pp. 55–67 (2001)
Chu, Y., Rao, S., Seshan, S., Zhang, H.: A Case for End System Multicast. IEEE Journal on Selected Areas in Communications 20(8), 1456–1471 (2002)
Dai, W.: Crypto++ 5.5 Benchmarks (2007), http://www.cryptopp.com/benchmarks.html
Deering, S.: Host Extensions for IP Multicast, Internet RFC 1112 (1989)
Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Kasera, S., Kurose, J., Towsley, D.: Scalable Reliable Multicast using Multiple Multicast Groups. In: Proc. ACM Sigmetrics 1997, Seattle, WA, pp. 64–74 (1997)
Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast Authentication in Fully Adversarial Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 241–253 (2004)
Mohamed, E., Abdel-Wahab, H.: Multicast for Multimedia Collaborative Applications: Services and Mechanisms. International Journal of Advanced Media and Communication (IJAMC) 1(3), 224–236 (2007)
Mohamed, E., Abdel-Wahab, H.: Multicast Error Control for Multimedia Collaborative Applications. In: The 9th IEEE Symposium on Computers and Communications (ISCC 2004), Alexandria, Egypt (2004)
Pannetrat, A., Molva, R.: Efficient Multicast Packet Authentication. In: The 10th Annual Network and Distributed System Security Symposium (NDSS 2003), San Diego, CA (2003)
Park, J., Chong, E., Siegel, H.: Efficient Multicast Packet Authentication using Erasure Codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Pendarakis, D., Shi, S., Verma, D., Waldvogel, M.: ALMI: An Application Level Multicast Infrastructure. In: Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (2001)
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proc. of the 8th ACM Conference on Computer and Communications Security, Philadelphia, PA (2001)
Perrig, A., Canetti, R., Tygar, J., Song, D.: The Tesla Broadcast Authentication Protocol. CryptoBytes 5(2), 2–13 (2002)
Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: 6th ACM Conference of Computing and Communication Security CCS 1999, Singapore (1999)
Wong, C., Lam, S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)
Yajnik, M., Kurose, J., Towsley, D.: Packet Loss Correlation in the Mbone Multicast Network: Experimental Measurements and Markov Chain Models. In: Proc. IEEE Globecom, pp. 94–99 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Mohamed, E.E., Abdel-Wahab, H. (2009). Collusion-Resistant Message Authentication in Overlay Multicast Communication. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science IV. Lecture Notes in Computer Science, vol 5430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01004-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-01004-0_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01003-3
Online ISBN: 978-3-642-01004-0
eBook Packages: Computer ScienceComputer Science (R0)