A source authentication scheme based on message recovery digital signature for multicast

The source authentication is an important issue for the multicast applications because it can let the receiver know whether the multicast message is sent from a legal source or not. However, the previously related schemes did not provide the confidentiality for data packets. In addition, the communication costs of these schemes are still high for real-time applications in the multicast environments. To solve the aforementioned problems, we propose a new source authentication scheme based on message recovery signature for multicast in this paper. In the proposed scheme, the encrypted data can be embedded in the digital signature, so the communication loads can be greatly reduced. In addition, the digital signature contains the encrypted data, and thus the confidentiality of data packets can be well protected. According to the aforementioned advantages, the proposed scheme is securer and more efficient than the related works for the real-time applications. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Xiaohua Jia,et al.  QoS multicast routing in cognitive radio ad hoc networks , 2012, Int. J. Commun. Syst..

[2]  Habib Youssef,et al.  MLCC: A new hash-chained mechanism for multicast source authentication , 2009 .

[3]  Yacine Challal,et al.  H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming , 2005, Comput. Secur..

[4]  Rainer A. Rueppel,et al.  A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.

[5]  J. William Atwood,et al.  Scalable solutions for secure group communications , 2007, Comput. Networks.

[6]  Wade Trappe,et al.  Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[9]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[10]  Chin-Chen Chang,et al.  A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  Zhou Zhi-guo,et al.  Notice of Violation of IEEE Publication Principles Design and Implementation of Wireless Computational Grid based on JavaSpace , 2007 .

[12]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[13]  Yan Li Application of Multi-Agent for Collaborative Product Design Engineering , 2007 .

[14]  Antonio Lioy,et al.  The ForwardDiffSig Scheme for Multicast Authentication , 2010, IEEE/ACM Transactions on Networking.

[15]  George Xylomenos,et al.  Support of multiple content variants in the multimedia broadcast/multicast service , 2011, Int. J. Commun. Syst..

[16]  Iuon-Chang Lin,et al.  An Efficient Source Authentication for Multicast Based on Merkle Hash Tree , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Xin Liu,et al.  Efficient and Secure Source Authentication with Packet Passports , 2006, SRUTI.

[18]  Yacine Challal,et al.  A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.

[19]  Yacine Challal,et al.  Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication , 2004, HSNMC.

[20]  Hsiao-Hwa Chen,et al.  A reliable overlay video transport protocol for multicast agents in wireless mesh networks , 2012, Int. J. Commun. Syst..

[21]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .