Dynamic Security Scheme for Multicast Source Authentication

Abstract Multicast source authentication is a burning issues in multicast communication because multicast technology provide the better communication than unicast and broadcast. But its design architecture any member can send the data to all joined receivers due to publicly available IP address of group manager. To solve this hottest problems, several schemes have been existed in this category such as simple hash chaining, tree hash chaining where the attacker intensity are unchanged. In this paper, we are going to propose a improved mechanism for multicast source authentication which adapts the security level deployed based on threshold value of attack success rate. The results shows that propose approach dynamic security mechanism in multicast at minimum communication and computation overhead

[1]  Toshinobu Kaneko,et al.  A LINEAR ATTACK ON THE RANDOM GENERATOR BY A NONLINEAR COMBINER , 1999 .

[2]  D. T. Lee,et al.  Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[3]  Zhou Zhi-guo,et al.  Notice of Violation of IEEE Publication Principles Design and Implementation of Wireless Computational Grid based on JavaSpace , 2007 .

[4]  Ran Canetti,et al.  Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.

[5]  Burton S. Kaliski,et al.  The MD2 Message-Digest Algorithm , 1992, RFC.

[6]  Mark Handley,et al.  The Use of Forward Error Correction (FEC) in Reliable Multicast , 2002, RFC.

[7]  Alex Koifman,et al.  RAMP: a reliable adaptive multicast protocol , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[8]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  R.S. Yadav,et al.  Bandwidth Delay Quality Parameter Based Multicast Congestion Control , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[11]  Christophe Diot,et al.  Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..

[12]  Babak Sadeghiyan,et al.  Methods of attack on hash functions , 1993 .

[13]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[14]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[15]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[16]  Jessica Staddon,et al.  Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[17]  Yacine Challal,et al.  A/sup 2/cast: an adaptive source authentication protocol for multicast streams , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[18]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[19]  Robert Braudes,et al.  Requirements for Multicast Protocols , 1993, RFC.

[20]  Ulrich Schmidt,et al.  Security and potential level preferences with thresholds , 2007 .

[21]  Gonzalo Camarillo,et al.  Security Attacks Found Against the Stream Control Transmission Protocol (SCTP) and Current Countermeasures , 2007, RFC.

[22]  Sushil Jajodia,et al.  Efficient security mechanisms for overlay multicast based content delivery , 2007, Comput. Commun..

[23]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[24]  Donald F. Towsley,et al.  Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[25]  Arnaud Legout,et al.  Bandwidth-allocation policies for unicast and multicast flows , 2001, IEEE/ACM Trans. Netw..

[26]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[27]  Sunyoung Han,et al.  User-Oriented Batch Processing of Individual Rekeying , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[28]  Eli Biham,et al.  TIGER: A Fast New Hash Function , 1996, FSE.

[29]  Brian Weis,et al.  The Multicast Group Security Architecture , 2004, RFC.

[30]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..