Font Size: a A A

Secure Multicast Infrastructure And Research On Multicast Source Authentication

Posted on:2009-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhouFull Text:PDF
GTID:2178360242477072Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Recently, with the development of Internet and video/audio technology at a very fast speed, more and more applications of multimedia and high-bandwidth appear. Multicast is used widely on the Internet, Compared with unicast, it not only saves the bandwidth on the network, but also implements on different structures and layers of network. Compared with broadcast, multicast is easier to be managed. But the security issues on the data transmission exist on network because of opening of network. So the research on multicast security has become a hot point among researchers.Now the basic and primary questions of secure multicast are key management and source authentication. The frame, Iolus, has solved the first question, it limits the overhead of updating keys within the corresponding subgroup when a member wants to join or leave a subgroup, therefore decreases the key updating messages but it doesn't support the concurrent multicast application. Source authentication is focused here which means the data multicast members have received must come from the correct sender. If the data is modified, receivers could recognize it. Among the many schemes , source authentication not only guarantee message's source, but also take the speed of packet construction, length of the message and communication overhead into consideration.Based on the questions above, this paper contributes to the following three aspects: first we provide a secure multicast infrastructure, version-based SMI, which inherits the merits of Iolus and supports the concurrent multicast application; second we bring out a hybrid multicast source authentication scheme, HMSA, which combines hash chain and authentication tree schemes. It has low computational and communication overhead and can resist packet loss. Especially receivers'authentication delay can be zero when there is no packet loss , finally , we bring out another source authentication scheme, Interlaced TESLA, which can resist DOS attack more effectively than traditional TESLA.
Keywords/Search Tags:secure multicast, source authentication, hash chain, authentication tree, interlaced
PDF Full Text Request
Related items