This paper presents an object-based stream authentication scheme for practical end-to-end applications on present network infrastructure and protocols. In this proposal, a stream is divided into objects that are delivered sequentially. Each object consists of a unique identifier, content and operations. At the sender side, a locked object identifier is produced by encrypting the object identifier with a key generated from MAC of the obj ect content. The obj ect content and locked identifier are transmitted to the receiver. The receiver can recover the object identifier and check it to authenticate the object. The scheme tolerates packet loss, and incurs no additional overhead if an identifier is ingeniously chosen. In the experiment, we overload some particular fields in the headers of standard protocols as object identifier to implement a real time video stream authentication scheme.
CITATION STYLE
Wu, Y., Ma, D., & Xu, C. (2002). Efficient object-based stream authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2551, pp. 354–367). Springer Verlag. https://doi.org/10.1007/3-540-36231-2_28
Mendeley helps you to discover research relevant for your work.