Font Size: a A A

Efficient, reliable, and secure source authentication schemes for realtime multicast

Posted on:2004-07-24Degree:Ph.DType:Dissertation
University:University of Maryland College ParkCandidate:Barnett, Charles AnthonyFull Text:PDF
GTID:1458390011954300Subject:Engineering
Abstract/Summary:
Multicast communication has the ability to distribute information to multiple receivers within the Internet and wireless access networks, creating the potential for the efficient, reliable, and secure distribution of realtime information to multiple destinations. In this work, we focus on innovative solutions for securing realtime multicast source authentication schemes. We demonstrate how to design reliable, delay-efficient, and secure source authentication schemes or alternatively how to achieve the delicate balance between realtime communication performance and security.; My development focuses on techniques that lead to computationally and delay-efficient, reliable and secure designs. I first consider the design of a packet loss robust chained stream source authentication scheme and then derive the necessary conditions for robustness. I propose a hybrid scheme, which combines a chained stream scheme with a delayed disclosure-of-keys scheme, for applications where the use of a packet-loss robust chained stream source authentication scheme is impractical due to excessive delay and/or communication overhead.; I propose two computationally efficient and secure time synchronization schemes for the delayed disclosure-of-keys scheme, which achieves extremely accurate time synchronization from a single measurement. I also propose a novel security architecture that facilitates reliable, computationally efficient, and secure realtime multicast source authentication. This approach maintains security, attenuates delay jitter, and implements reliable multicast at each level in the multicast source distribution tree.; Finally, I propose a resource-efficient and secure multicast scheme, which addresses resource usage inefficiencies in the existing European Telecommunication Standard Institute's (ETSI's) proposed third-generation (3G) broadband wireless standard.; The source authentication schemes meet the reliability, computational and delay efficiency, and security requirements of realtime multicast, unlike traditional schemes, which focus primarily on the security criterion and computational efficiency of secure source authentication schemes.
Keywords/Search Tags:Source authentication schemes, Multicast, Reliable, Efficient, Security
Related items