By Topic

Denial-of-service resistant multicast authentication protocol with prediction hashing and one-way key chain

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Seonho Choi ; Dept. of Comput. Sci., Bowie State Univ., Road Bowie, MD, USA

Requirements that need to be met by multicast authentication schemes are packet authenticity, packet loss robustness, loss model independence, and denial of service (DoS) resistance. We develop an efficient multicast authentication scheme for real-time streaming applications that is resistant to denial-of-service attacks while consuming much less resources (CPU and buffer) at receivers compared to previously proposed schemes. This scheme utilizes prediction hashing (PH) and one-way key chain (OKC) techniques based on erasure codes and distillation codes. PH and OKC techniques enable the receiver to significantly reduce the CPU overhead and buffer requirements compared to other block-based solution approaches. Analysis conducted indicates that this new scheme consumes much less CPU time and buffer space than one of the recently proposed denial-of-service (DoS) resistant multicast authentication schemes, pollution resistant authenticated block streams (PRABS) (Karlof et al., 2004), by a factor of more than 5 for buffer requirement and 3 for CPU requirement.

Published in:

Multimedia, Seventh IEEE International Symposium on

Date of Conference:

12-14 Dec. 2005