Hybrid and adaptive hash-chaining scheme for data-streaming source authentication

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Multicast source authentication is an important component in the multicast security framework. This security service must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be important in volume (streaming). Besides, multicast source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery. In this paper, we propose an adaptive and efficient source authentication protocol which tolerates packet loss and guarantees non-repudiation in media-streaming. This protocol relies on a new hybrid hash-chaining scheme. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Challal, Y., Bettahar, H., & Bouabdallah, A. (2004). Hybrid and adaptive hash-chaining scheme for data-streaming source authentication. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3079, 1056–1067. https://doi.org/10.1007/978-3-540-25969-5_98

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free