A source authentication and data confidentiality scheme for multicast networks

Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Benmachiche, Abderrahim, Ali, Salami, Messikh Azeddine, Azeddine
التنسيق: مقال
اللغة:English
منشور في: IIUM Press 2016
الموضوعات:
الوصول للمادة أونلاين:http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf
http://irep.iium.edu.my/53007/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
المؤسسة: Universiti Islam Antarabangsa Malaysia
اللغة: English
الوصف
الملخص:Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much.