Font Size: a A A

Research On Multicast Authentication Technology

Posted on:2011-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y N WangFull Text:PDF
GTID:2178360305464159Subject:Information security
Abstract/Summary:PDF Full Text Request
Multicast technology plays an important role in the application of network services and multimedia, while the security of multicast is the necessary prerequisite to provide the technology to apply widely. In the existing multicast authentication technology research, there is no mechanism that can provide good effects in both the security and performance. In the IP multicast, most people use the asymmetric source authentication mechanism. This mechanism has a good ability of resistance to conspiracy, but it is not satisfied in communication, computation and resistance to package loss; In the TESLA mechanism that is applied to the wireless multicast network system, an enemy can inject a large amount of invalid packets to choke the decoding process in the receivers. In view of the above problems, this paper researches and designs two multicast source authentication schemes that are suitable for IP multicast and wireless multicast.In the IP multicast, this paper uses the asymmetric authentication mechanism based on the MAC. The author uses Merkle tree to distribute these authentication keys, and this way greatly reduces the number of authentication keys. Through introducing virtual users and secondary keys, the mechanism improve the ability of resistance to conspiracy. Analysis showed, this mechanism has a balance of the safety and the efficiency of the implementation. In the wireless multicast, the author combines EMSS and TESLA, and proposes the EMSS-TESLA mechanism in order to improve the ability of resistance to package loss and DoS attack. In the way that using the sender cache instead of the receiver cache, the author achieve the immediate authentication. This mechanism greatly improves the authentication efficiency and advances the application of the TESLA mechanism in the wireless network.
Keywords/Search Tags:multicast authentication, MAC, resistance to conspiracy, EMSS-TESLA, DoS
PDF Full Text Request
Related items