By Topic

An Authentication Scheme for Multicast Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
R. Srinivasan ; Department of Electronics Engineering, MIT Campus of Anna University, India. Email: srini0402@yahoo.com ; V. Vaidehi ; S. Arvind ; A. C. Krishnakumar

Most of the prior works on formulating authentication schemes for multicast networks focus on less general models, where random, rather than adversarially selected, packets may be dropped and altered. Most of them don't tolerate new packet injections. In this paper an efficient secure reliable robust scheme is proposed and implementation results are presented. This scheme is based on a novel combination of error correcting codes with standard cryptographic primitives. A general network model is proposed where an adversary can perform various attacks on the transmitted streams. In this model, two parameters of the network, the survival rate and the flood rate, characterize the power of the adversary. This paper implement the authentication scheme in a generic manner so that the various network parameters, namely the survival rate, flood rate, decoder tolerance rate can be tuned to achieve better performance in terms of communication overhead and computation costs

Published in:

2007 International Conference on Signal Processing, Communications and Networking

Date of Conference:

22-24 Feb. 2007