Abstract
A new multicast authentication scheme for real-time streaming applications was proposed [28] that is resistant to denial-of-service attacks with less resource usages (CPU and buffer) at receivers compared to previously proposed schemes. This scheme utilizes prediction hashing (PH) and one-way key chain (OKC) techniques based on erasure codes and distillation codes. Detailed protocol description is presented at the sender and receiver sides, and a worst-case resource (memory and CPU) requirement at the receiver-side is obtained with an assumption of security condition.
This work was supported by US Army Research Office grant 48575-RT-ISP.
Chapter PDF
Similar content being viewed by others
References
Adkins, D., Lakshminarayanan, K., Perrig, A., Stoica, I.: Taming IP packet flooding attacks. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-II) (November 2003)
Anderson, T., Roscoe, T., Wetherall, D.: Preventing Internet denial-of-service with capabilities. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-II) (November 2003)
Baric, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997)
Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470–484. Springer, Heidelberg (1997)
Benaloh, J., de Mare, M.: One way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994)
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)
Gligor, V.: Guaranteeing access in spite of service-flooding attacks. In: Proceedings of the Security Protocols Workshop (April 2003)
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), Internet Society, February 2001, pp. 13–22 (2001)
Goodrich, M., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372–388. Springer, Heidelberg (2002)
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. 11th Network and Distributed Systems Security Symposium (NDSS), San Diego, CA (February 2004)
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)
Luby, M.: LT codes. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2002), pp. 271–282 (2002)
Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proceedings of 29th Annual ACM Symposium on Theory of Computing (STOC 1997), May 1997, pp. 150–159 (1997)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122–134 (1980)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 2001, pp. 232–246 (2001)
Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003), Internet Society (February 2003)
Park, J.M., Chong, E., Siegel, H.J.: Efficient multicast packet authentication using erasure codes. ACM Transactions on Information and System Security (TISSEC) 6(2), 258–285 (2003)
Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 227–240 (May 2002)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), Internet Society, pp. 35–46 (February 2001)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 2000, pp. 56–73 (2000)
Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2002)
Rabin, M.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36(2), 335–348 (1989)
Reed, I., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics 8(2), 300–304 (1960)
Rizzo, L.: Effective erasure codes for reliable computer communication protocols. ACM Computer Communication Review 27(2), 24–36 (1997)
Sander, T.: Efficient accumulators without trapdoor extended abstracts. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 252–262. Springer, Heidelberg (1999)
Song, D., Zuckerman, D., Tygar, J.D.: Expander graphs for digital stream authentication and robust overlay networks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 2002, pp. 258–270 (2002)
Wong, C., Lam, S.: Digital signatures for flows and multicasts. In: Proceedings on the 6th International Conference on Network Protocols (ICNP 1998), October 1998, pp. 198–209. IEEE, Los Alamitos (1998)
Choi, S.: Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. In: Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), pp. 701–706 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, S., Kim, Y. (2006). Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. In: Zhou, X., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11807964_31
Download citation
DOI: https://doi.org/10.1007/11807964_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36850-2
Online ISBN: 978-3-540-36851-9
eBook Packages: Computer ScienceComputer Science (R0)