Multicast Routing Authentication System using Advanced Tesla

The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer overflow denial of service attacks, and allow for multiple levels of trust in authentication. Throughout this base paper, the main focus of discussion will be on the popular multicast authentication scheme Timed Efficient Stream Loss-tolerant Authentication (TESLA) based upon the delayed key disclosure principle. Similar to other schemes based upon delayed key disclosure, TESLA is susceptible to Denial-of-Service (DoS) attacks and is not well suited for delay-sensitive applications.

[1]  Steve M. Bellovin,et al.  ICMP Traceback Message , 2003 .

[2]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[3]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[4]  T. Hardjono,et al.  Key establishment for IGMP authentication in IP multicast , 2000, 1st European Conference on Universal Multiservice Networks. ECUMN'2000 (Cat. No.00EX423).

[5]  Noga Alon Probabilistic Methods in Extremal Finite Set Theory , 2002 .

[6]  Matt Bishop A security analysis of the NTP protocol version 2 , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Mostafa H. Ammar,et al.  WHIM: watermarking multicast video with a hierarchy of intermediaries , 2002, Comput. Networks.

[9]  Richard D. Gitlin,et al.  Diversity coding for transparent self-healing and fault-tolerant communication networks , 1993, IEEE Trans. Commun..

[10]  Klara Nahrstedt,et al.  Secure multicast protocol with copyright protection , 1999, Electronic Imaging.

[11]  Charalampos Manifavas,et al.  A new family of authentication protocols , 1998, OPSR.

[12]  Bruno Crispo,et al.  Chained Stream Authentication , 2000, Selected Areas in Cryptography.

[13]  Steven M. Bellovin,et al.  ICMP Traceback Messages , 2003 .

[14]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[15]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[16]  Tony Ballardie,et al.  A New Approach to Multicast Communication in a Datagram Internetwork , 1995 .

[17]  Roberto Tamassia,et al.  Multicast authentication in fully adversarial networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[18]  Bruno Crispo,et al.  Individual single source authentication on the MBONE , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[19]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[20]  Isidor Kouvelas,et al.  Source-Specific Protocol Independent Multicast , 2000 .

[21]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.