Efficient object-based stream authentication

4Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents an object-based stream authentication scheme for practical end-to-end applications on present network infrastructure and protocols. In this proposal, a stream is divided into objects that are delivered sequentially. Each object consists of a unique identifier, content and operations. At the sender side, a locked object identifier is produced by encrypting the object identifier with a key generated from MAC of the obj ect content. The obj ect content and locked identifier are transmitted to the receiver. The receiver can recover the object identifier and check it to authenticate the object. The scheme tolerates packet loss, and incurs no additional overhead if an identifier is ingeniously chosen. In the experiment, we overload some particular fields in the headers of standard protocols as object identifier to implement a real time video stream authentication scheme.

Cite

CITATION STYLE

APA

Wu, Y., Ma, D., & Xu, C. (2002). Efficient object-based stream authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2551, pp. 354–367). Springer Verlag. https://doi.org/10.1007/3-540-36231-2_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free