Font Size: a A A

Research And Implement Of Multicast Source Authentication Based On Events Sequence

Posted on:2004-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiFull Text:PDF
GTID:2168360122960386Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of the applications of video-meeting, netgame, electric whiteboard etc., more and more applications of multicast technology appear, and their security requirement is also increasing. The current research on multicast security has developed for a long time abroad, but there is little research work about it in China. So it is very important and urgent to research into this field.This thesis researches multicast security issues, and presents a new classification . From the research, we know that there has been no very good source authentication method which can satisfy the users' demands. The primary reason of no good method is higer requirement in multicast environment. We need efficient authentication even when there are packet loss and no senders' information. These restricts make source authentication difficultly accomplish in multicast environment.This thesis detailedly researches into source authentication, introducing and analyzing some previous source authentication methods. It analyzes a source authentication method(TESLA) which is being paid more and more attention nowadays, its function, shortcoming and current improvement, and points out its secure vulnerability. We draw a conclusion: though TESLA has many advantages, such as the low communication cost, tolerance of pack loss, there are still many problems, which mostly arise from the requirement of synchronous time.In order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence----ESA(Events Sequence Authentication). This scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication andtolerance of pack loss. The thesis constructs two new techniques of source authentication in ESA scheme: double direction HASH chain authentication and checkroll authentication.The realization of the ESA scheme is described in this thesis. To verify ESA scheme, BAN logic analysis, attack model and experiment examination are used ,which proves the correctness of ESA scheme and its ability to resist many attacks.
Keywords/Search Tags:network security, multicast, source authentication, ESA
PDF Full Text Request
Related items