A source authentication and data confidentiality scheme for multicast networks

Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...

Full description

Saved in:
Bibliographic Details
Main Authors: Benmachiche, Abderrahim, Ali, Salami, Messikh Azeddine, Azeddine
Format: Article
Language:English
Published: IIUM Press 2016
Subjects:
Online Access:http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf
http://irep.iium.edu.my/53007/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.53007
record_format dspace
spelling my.iium.irep.530072017-02-07T03:02:20Z http://irep.iium.edu.my/53007/ A source authentication and data confidentiality scheme for multicast networks Benmachiche, Abderrahim Ali, Salami Messikh Azeddine, Azeddine T Technology (General) Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much. IIUM Press 2016 Article REM application/pdf en http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf Benmachiche, Abderrahim and Ali, Salami and Messikh Azeddine, Azeddine (2016) A source authentication and data confidentiality scheme for multicast networks. International Journal on Perceptive and Cognitive Computing, 2 (2). pp. 1-4. ISSN 2462-229X http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Benmachiche, Abderrahim
Ali, Salami
Messikh Azeddine, Azeddine
A source authentication and data confidentiality scheme for multicast networks
description Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much.
format Article
author Benmachiche, Abderrahim
Ali, Salami
Messikh Azeddine, Azeddine
author_facet Benmachiche, Abderrahim
Ali, Salami
Messikh Azeddine, Azeddine
author_sort Benmachiche, Abderrahim
title A source authentication and data confidentiality scheme for multicast networks
title_short A source authentication and data confidentiality scheme for multicast networks
title_full A source authentication and data confidentiality scheme for multicast networks
title_fullStr A source authentication and data confidentiality scheme for multicast networks
title_full_unstemmed A source authentication and data confidentiality scheme for multicast networks
title_sort source authentication and data confidentiality scheme for multicast networks
publisher IIUM Press
publishDate 2016
url http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf
http://irep.iium.edu.my/53007/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23
_version_ 1643614274637004800