{"title":"ARMLCC:基于自适应和恢复的多播源认证的多层连接链机制","authors":"Hamdi Eltaief, A. Kamel, H. Youssef","doi":"10.1109/ISIAS.2013.6947730","DOIUrl":null,"url":null,"abstract":"Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication\",\"authors\":\"Hamdi Eltaief, A. Kamel, H. Youssef\",\"doi\":\"10.1109/ISIAS.2013.6947730\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.\",\"PeriodicalId\":370107,\"journal\":{\"name\":\"2013 9th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 9th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2013.6947730\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 9th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2013.6947730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication
Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.