Font Size: a A A

A Study Of Security Multicast And Source Authentication

Posted on:2005-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZouFull Text:PDF
GTID:2168360125964910Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Recently, along with the development of Internet and video/audio technology at very fast speed, more and more applications of multimedia and high-bandwidth appear. Multicast is a communication way on the Internet. Compared with unicast, it not only saves bandwidth on network, but also implements on different structures and layers of network. Compared with broadcast, multicast is more easy to be managed and know the situation of multicast members. But the security question on the data transition exists on network because of opening of network. So the research on multicast security has become a critical topic on research people.As multicast security, there are many unsolved questions. Many solutions on multicast security are been in theory. So the type of multicast application has become a important factor. For example, the security question of multicast member's expanding should be thought in distance education; the encryption and authentication of data source in video application should be thought. After analyze the standard of security multicast and lolus, we provide a frame of multi-level security multicast based on logic hierarchical tree.The basic and primary questions of security multicast are key management and source authentication now. It focused on source authentication in this paper. Source authentication is that the data multicast members received must come from the correct sender. If data was modified, receiver could recognize it. The scheme of source authentication not only guarantee message's source, but also think the speed of making message, length of message and communication overhead. As source authentication mechanism on security multicast, the biggest obstacle is request compact, low dissipation and low communication overhead. In this paper, we describe a few source authentication schemes based binary tree and target collision resistance function according to the characters of binary tree and target collision resistance function, and explicate the procedure of message authentication and verification, and analyze their security performance, computation cost and verification probability.
Keywords/Search Tags:security multicast, source authentication, digital signature, binary tree, target collision resistance function
PDF Full Text Request
Related items