Authenticast: A Source Authentication Protocol for Multicast Flows and Streams

The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.





References:
[1] F. Bergadano, D. Cavagnino, and B. Crispo. Individual Sin-
gle Source Authentication on the MBone. IEEE International
Conference on Multimedia and Expo, 2000.
[2] Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, and
Moni Naor. Multicast Security: A taxonomy and Efficient Con-
structions. INFOCOM, 1999.
[3] Rosario Gennaro and Pankaj Rohatgi. How to Sign Digital
Streams. Information and Computation, 165(1):100-116, Febru-
ary 2001.
[4] Sara Miner and Jessica Staddon. Graph-Based Authentication
of Digital Streams. IEEE Symposium on Security and Privacy,
2001.
[5] J. M. Park, E. K. P. Chong, and H. J Siegel. Efficient Multicast
Packet Authentication Using Signature Amortization. IEEE
Symposium on Security and Privacy, 2002.
[6] Vern Paxson. End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking, 7(3):277-292, June
1999.
[7] A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Efficient Au-
thentication and Signing of Multicast Streams over Lossy Chan-
nels. IEEE Symposium on Security and Privacy, 2000.
[8] Adrian Perrig. The BiBa One-Time Signature and Broadcast
Authentication Protocol. The 8th ACM Conference on Com-
puter and Communications Security, November 2001.
[9] Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. The
TESLA Broadcast Authentication Protocol. RSA CryptoBytes,
5, Summer 2002.
[10] Nagendra Modadugu Philippe Golle. Authenticating Streamed
Data in the Presence of Random Packet Loss. NDSS-01: The
Network and Distributed System Security Symposium, 2001.
[11] Chung Kei Wong and Simon S. Lam. Digital Signatures for
Flows and Multicasts. IEEE/ACM Transactions on Network-
ing, 7(4), August 1999.
[12] Maya Yajnik, Sue Moon, Jim Kurose, and Don Towsley. Mea-
surement and Modeling of the Temporal Dependence in Packet
Loss. INFOCOM-99, pages 345-352, March 1999.