Skip to main content
Top

2018 | OriginalPaper | Chapter

Performance Evaluation of Multicast Source Authentication Scheme

Authors : Yogendra Mohan, C. Rama Krishna, Karan Singh

Published in: Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multicast is a one to group communication. The applications of multicast are broadcasting stock quotes, videoconferencing, and software distribution. The deployment of efficient and secure communication mechanism is hindered because of the lack of security. There are various schemes such as simple hash scheme, hash tree scheme, and hash tree signature scheme. But these existing approaches also suffer from communication overhead and computation overhead. To solve the major problem of security concern is solved with support of source authentication mechanism. The purpose of our work is to evaluate the performance of multicast source authentication. The objectives of the proposed work are to reduce the communication overhead and computation cost of multicast communication system. The proposed work is implemented in QualNet 5.1.2.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Challal Y, Bettahar H, Bouabdallah (2004) A taxonomy of multicast data origin authentication: issues and solutions. IEEE Comm Surveys Tutorials 6(3):34–57CrossRef Challal Y, Bettahar H, Bouabdallah (2004) A taxonomy of multicast data origin authentication: issues and solutions. IEEE Comm Surveys Tutorials 6(3):34–57CrossRef
2.
go back to reference Wang Q, Nahrstedt K (2009) Time valid one-time signature for time-critical multicast data authentication. In: IEEE INFOCOM, Rio de Janeiro Wang Q, Nahrstedt K (2009) Time valid one-time signature for time-critical multicast data authentication. In: IEEE INFOCOM, Rio de Janeiro
3.
go back to reference Balasubramanian K, Roopa R (2012) HTSS: hash tree signature scheme for multicast authentication. IJCA proceedings on international conference in recent trends in computational methods, communication and controls (ICON3C), no 6, pp 28–32, Apr 2012 Balasubramanian K, Roopa R (2012) HTSS: hash tree signature scheme for multicast authentication. IJCA proceedings on international conference in recent trends in computational methods, communication and controls (ICON3C), no 6, pp 28–32, Apr 2012
4.
go back to reference Berbecaru D, Albertalli L, Lioy A (2010) The forward diffusion scheme for multicast authentication. IEEE/ACM Trans Netw 18(6):1855–1868CrossRef Berbecaru D, Albertalli L, Lioy A (2010) The forward diffusion scheme for multicast authentication. IEEE/ACM Trans Netw 18(6):1855–1868CrossRef
5.
go back to reference Perrig A, Canetti R, Song D, Tygar J (2001) Efficient and secure source authentication for multicast. In: Proceedings of network and distributed system security symposium (NDSS-2001), vol 1, pp 35–46 Perrig A, Canetti R, Song D, Tygar J (2001) Efficient and secure source authentication for multicast. In: Proceedings of network and distributed system security symposium (NDSS-2001), vol 1, pp 35–46
6.
go back to reference Park JM, Chong E, Siegel H (2002) Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE symposium on research in security and privacy, pp 227–240 Park JM, Chong E, Siegel H (2002) Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE symposium on research in security and privacy, pp 227–240
7.
go back to reference Lin IC, Sung CC (2010) An efficient source authentication for multicast based on Merkle hash tree. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing (IIH-MSP-2010), pp 5–8, Oct 2010 Lin IC, Sung CC (2010) An efficient source authentication for multicast based on Merkle hash tree. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing (IIH-MSP-2010), pp 5–8, Oct 2010
8.
go back to reference Perrig A, Tygar JD, Song D, Canetti R (2000) Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp 56–73 Perrig A, Tygar JD, Song D, Canetti R (2000) Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp 56–73
9.
go back to reference Perrig A, Tygar JD et al (2001) Efficient and secure source authentication for multicast. In: Internet society network and distributed system security, pp 35–46 Perrig A, Tygar JD et al (2001) Efficient and secure source authentication for multicast. In: Internet society network and distributed system security, pp 35–46
10.
go back to reference ElKabbany GF, Aslan HK (2012) Efficient design for the implementation of Wong-Lam multicast authentication protocol using two-levels of parallelism. IJCSI Int Comput Sci Issues 9(3, 1), May 2012 ElKabbany GF, Aslan HK (2012) Efficient design for the implementation of Wong-Lam multicast authentication protocol using two-levels of parallelism. IJCSI Int Comput Sci Issues 9(3, 1), May 2012
11.
go back to reference Hou A, Yang S et al (2009) Secure elliptic curve generating algorithm over GF. Comput Eng 23:138–140 Hou A, Yang S et al (2009) Secure elliptic curve generating algorithm over GF. Comput Eng 23:138–140
12.
go back to reference Park JM, Siegel JM et al (2002) Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy Park JM, Siegel JM et al (2002) Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy
13.
go back to reference Chan A (2003) A graph-theoretical analysis of multicast authentication. In: 23rd international conference on distributed computing systems Chan A (2003) A graph-theoretical analysis of multicast authentication. In: 23rd international conference on distributed computing systems
14.
go back to reference Shiv kumar S, Umamaheswari G (2014) Certificate authority schemes using elliptic curve cryptography, rsa and their variants simulation using Ns2. Am J Appl Sci 11(2):171–179CrossRef Shiv kumar S, Umamaheswari G (2014) Certificate authority schemes using elliptic curve cryptography, rsa and their variants simulation using Ns2. Am J Appl Sci 11(2):171–179CrossRef
15.
go back to reference Sridevi J, Mangaiyarkarasi R (2011) Efficient multicast packet authentication using digital signature. Int J Comput Appl® (IJCA). In: International Conference on Emerging Technology Trends (ICETT) Sridevi J, Mangaiyarkarasi R (2011) Efficient multicast packet authentication using digital signature. Int J Comput Appl® (IJCA). In: International Conference on Emerging Technology Trends (ICETT)
16.
go back to reference Jin-xin, Zhou ZG et al (2007) A hybrid and efficient scheme of multicast source authentication. In: Eighth ACIS international conference on software engineering, artificial intelligence networking and parallel/distributed computing, vol 2, pp 123–125 Jin-xin, Zhou ZG et al (2007) A hybrid and efficient scheme of multicast source authentication. In: Eighth ACIS international conference on software engineering, artificial intelligence networking and parallel/distributed computing, vol 2, pp 123–125
17.
go back to reference Suri SS, Varghese G (2001) A lower bound for multicast key distribution. In: Proceedings of IEEE INFOCOM, pp 422–431, Apr 2001 Suri SS, Varghese G (2001) A lower bound for multicast key distribution. In: Proceedings of IEEE INFOCOM, pp 422–431, Apr 2001
18.
go back to reference Eltaief H, Youssef H (2010) RMLCC: recovery-based multi-layer connected chain mechanism for multicast source authentication. In: 35th annual IEEE conference on local computer networks, Colorado Eltaief H, Youssef H (2010) RMLCC: recovery-based multi-layer connected chain mechanism for multicast source authentication. In: 35th annual IEEE conference on local computer networks, Colorado
19.
go back to reference Wong CK, Gouda M, Lam SS (1998) Secure group communications using key graph. In: Proceedings of the ACM SIGCOMM’98, Canada, pp 68–79, Sept 1998CrossRef Wong CK, Gouda M, Lam SS (1998) Secure group communications using key graph. In: Proceedings of the ACM SIGCOMM’98, Canada, pp 68–79, Sept 1998CrossRef
20.
go back to reference Boneh D, Franklin M et al (2001) Lower bounds for multicast message authentication. Eurocrypt, LNCS (2045):437–452 Boneh D, Franklin M et al (2001) Lower bounds for multicast message authentication. Eurocrypt, LNCS (2045):437–452
21.
go back to reference Borella M, Swider D, Uludag S, Brewster G (1998) Internet packet loss: measurement and implications for end-to-end Qos. In: International conference on parallel processing, Aug 1998 Borella M, Swider D, Uludag S, Brewster G (1998) Internet packet loss: measurement and implications for end-to-end Qos. In: International conference on parallel processing, Aug 1998
23.
go back to reference Pannetrat A, Molva R (2003) Efficient multicast packet authentication. In: Proceedings of the ISOC network and distributed system security symposium, pp 251–262, Feb 2003 Pannetrat A, Molva R (2003) Efficient multicast packet authentication. In: Proceedings of the ISOC network and distributed system security symposium, pp 251–262, Feb 2003
24.
go back to reference Qing-Hai A, Lu X et al (2012) Research on design principles of elliptic curve public key cryptography and its implementation. In: International conference on computer science and service system 2012 Qing-Hai A, Lu X et al (2012) Research on design principles of elliptic curve public key cryptography and its implementation. In: International conference on computer science and service system 2012
25.
go back to reference Perrig A, Canetti R, Tygar JD, Song D (2004) Efficient authentication and signing of multicast streams over lossy channels. In: Proceeding IEEE symposium on security and privacy (SP ’00), pp 56–75, Feb 2004 Perrig A, Canetti R, Tygar JD, Song D (2004) Efficient authentication and signing of multicast streams over lossy channels. In: Proceeding IEEE symposium on security and privacy (SP ’00), pp 56–75, Feb 2004
26.
go back to reference Solum E, Chakravarthy R (2009) Modular over-the-wire configurable security forlonglived critical infrastructure monitoring systems. In: Proceedings of 3rd ACM international conference on distributed event-based systems (DEBS 2009), Nashville, TN, July 2009 Solum E, Chakravarthy R (2009) Modular over-the-wire configurable security forlonglived critical infrastructure monitoring systems. In: Proceedings of 3rd ACM international conference on distributed event-based systems (DEBS 2009), Nashville, TN, July 2009
27.
go back to reference Choi S (2005) Denial-of-service resistant multicast authentication protocol with prediction hashing and one-way key chain. In: Seventh IEEE international symposium on multimedia (ISM ’05), Dec 2005 Choi S (2005) Denial-of-service resistant multicast authentication protocol with prediction hashing and one-way key chain. In: Seventh IEEE international symposium on multimedia (ISM ’05), Dec 2005
28.
go back to reference Bergadano F, Crispo B et al (2002) Individual authentication in multiparty communications. Comput Secur 21(8):719–735CrossRef Bergadano F, Crispo B et al (2002) Individual authentication in multiparty communications. Comput Secur 21(8):719–735CrossRef
29.
go back to reference Canetti R, Pinkas B et al (1999) Multicast security: a taxonomy and ecient constructions. INFOCOM Canetti R, Pinkas B et al (1999) Multicast security: a taxonomy and ecient constructions. INFOCOM
30.
go back to reference Hauser CH, Thanigaina than Manivannan et al (2012) Evaluating multicast message authentication protocols for use in wide area power grid data delivery services. In: 45th Hawaii international conference on system sciences Hauser CH, Thanigaina than Manivannan et al (2012) Evaluating multicast message authentication protocols for use in wide area power grid data delivery services. In: 45th Hawaii international conference on system sciences
31.
go back to reference Zhou Y, Fang Y (2007) Multimedia broadcast authentication based on batch signature. IEEE Comm Magazine 45(8):72–77CrossRef Zhou Y, Fang Y (2007) Multimedia broadcast authentication based on batch signature. IEEE Comm Magazine 45(8):72–77CrossRef
32.
go back to reference FeiJia and Mario Gerla (2010) Group-based secure source authentication protocol for VANETs. Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks, IEEE FeiJia and Mario Gerla (2010) Group-based secure source authentication protocol for VANETs. Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks, IEEE
33.
go back to reference Challal Y, Bouabdallah A (2004) A taxonomy of multicast data origin authentication: issues and solutions. IEEE Commun Surv Tutorials—COMSUR 6(1–4):34–57CrossRef Challal Y, Bouabdallah A (2004) A taxonomy of multicast data origin authentication: issues and solutions. IEEE Commun Surv Tutorials—COMSUR 6(1–4):34–57CrossRef
34.
go back to reference Bergadano F, Crispo B (2000) Individual single source authentication on the MBone. In: IEEE international conference on multimedia and expo Bergadano F, Crispo B (2000) Individual single source authentication on the MBone. In: IEEE international conference on multimedia and expo
35.
go back to reference Fuloria F, Alvarez F (2010) The protection of substation communications. In Proceedings of SCADA security scientific symposium, Jan 2010 Fuloria F, Alvarez F (2010) The protection of substation communications. In Proceedings of SCADA security scientific symposium, Jan 2010
36.
go back to reference Bai Z, Yang H, Zhang W (2011) Study on fast implementation of prime-field ECC. Commun Technol 12(87–89):92 Bai Z, Yang H, Zhang W (2011) Study on fast implementation of prime-field ECC. Commun Technol 12(87–89):92
37.
go back to reference Pang S, Liu S, Cong F, Yao Z (2011) An efficient scalar multiplication algorithm on montgomery-form elliptic curve. Acta Electronica Sinica 04:865–868 Pang S, Liu S, Cong F, Yao Z (2011) An efficient scalar multiplication algorithm on montgomery-form elliptic curve. Acta Electronica Sinica 04:865–868
Metadata
Title
Performance Evaluation of Multicast Source Authentication Scheme
Authors
Yogendra Mohan
C. Rama Krishna
Karan Singh
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_38

Premium Partner