Font Size: a A A

Research Of Data Streams Authentication Model Oriented On Multicast

Posted on:2011-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiuFull Text:PDF
GTID:2248330395457967Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of multicast technology, the Internet application based on amulticast data strems is becoming more and more popular, such as the data monitoring system in sensor network and the on-line data processing in finance, etc. Authentication of data streams in multicast becomes an important problem in multicast security, it relates to whether the data stream is credible, the packet loss and injection in the transmission of data streams will lead deficiency, soure confusion and falsification of packets in the stream received by the receiving terminal, so how to assure the integrity and reliability of the received packets without receiving the full stream becomes an important research topic in the field of authentication. Specially, the timeliness of authentication becomes important under the condition of real-time transmission. Specifically, for the real-time transmission of data flow, the timeliness of authentication is very important.Based on the problems, the thesis defines a network model with two prameters which are survial rate and flood rate, and an authetication model of data stream in multicast is given based on this. The model adopts hash function, digital signature and Reed-Solomon Error-correcting Code technology, the thesis proposes an authetication method of data stream in multicast based on (α,β), and gives the design thought and detailed instruction of the three algrithm, including key production, authetication and validation, This proves the correctness and security of the authentication method in multicast.In this thesis, the computational cost of the data stream authentication methods, the cost of commucation and the cost of delay are analyzed, and the advantages of low cost and good performance of this authentication method is showed. Especially in aspect of the cost of communication, this method’s is lower; Compared with the existed schemes, this method has a better performance in the aspects of authentication cost which includes security, time and space. Finally, the concrete realization of the prototype system which orients to the authentication for both sides under the circumstance of multicast is given.
Keywords/Search Tags:Data Streams Authentication, Multicast, Reed-Solomon Error-correcting Code, Packet Loss
PDF Full Text Request
Related items