DUAL HASH PROTOCOL - A protocol for Authentication with Non-repudiation in Multicast Stream

Guru Baskar T*, Manickam P**
*,** Senior Lecturer in the Department of Applied Sciences.Sethu Institute of Technology
Periodicity:April - June'2007
DOI : https://doi.org/10.26634/jse.1.4.722

Abstract

Multicast communication is widely adopted in real-time applications today such as Audio, Video and Data transfer. Though various types of protocols for multicasting communication exist, they are not fully satisfied regarding with security. Still a lot of research works is being carried out to support the security services like confidentiality, authentication, non-repudiation, integrity and access-control.

Most of the applications need the source authentication of the multicast information even after packet loss like video conferencing. In this paper, we first present the structure and applications of multicast communication. Then, we focus some of the recent authentication techniques for multicast stream flow. Finally, we will discuss about our proposed Protocol that authenticates the source of the multicast flow with non-repudiation and tolerates packet loss using redundant hash-chaining technique.

Keywords

Multicast Security, Source Authentication, Non-Repudiation, Hash, Signature

How to Cite this Article?

Guru Baskar T and Manickam P (2007). DUAL HASH PROTOCOL - A protocol for Authentication with Non-repudiation in Multicast Stream. i-manager’s Journal on Software Engineering, 1(4), 19-22. https://doi.org/10.26634/jse.1.4.722

References

[1]. Bruch Schneier, "Applied Cryptography , Toto McGraw Hili, Second Edition, John Wiley & Sons, I 996 .
[2]. Douglas E. Comer, "internetworking with TCP/IP:Voi 1 Principles, Protocols and Architecture", Fifth Edition, 2005.
[3]. Perrig, R. Canetti, J.D. Tygar, and D. Song, "Efficient authentication and signing of muiticast streams over lossy channeis", IEEE Symposium on Security and Privacy, 2000.
[4]. Rosario Gennaro and Pankaj Rohatgi, "How to sign digital streams", Information and Computation, I 65( I ):1001 I 6, February 2001 .
[5]. Nagendra Modadugu and Philippe Golle, "Authenticating streamed data in the presence of random packet loss", NDSS'O1.'The Network and Distributed System Security Symposium, 2001 .
[6]. Yacine chailal and Abdelmadjid Bouabdalla, "Authenticast: a source authentication protocol for muiticast flows and streams", Transactions on Engineering, Computing and Technology, V6, June 2005.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.