Information Technology Reference
In-Depth Information
The Adaptive Multicast Data Origin Authentication
Protocol
Liehuang Zhu * , Hao Yang, and Zhenghe Yang
Beijing Engineering Research Center of Massive Language Information Processing
and Cloud Computing Application, School of Computer Science and Technology,
Beijing Institute of Technology, China, Beijing
{liehuangz,haoy0320,zhenghey}@bit.edu.cn
Abstract. Most multicast data origin authentication schemes work under the
fixed parameters without taking the problem of changeable network environ-
ment into account. However, the network conditions will obviously influence
the efficiency of a protocol such as the time delay and the overhead. So adjust-
ing the parameters adaptively to achieve the ideal state with the dynamic
network is necessary. To achieve a high authentication rate and adapt to the
changeable and unstable network environment, we proposed a multicast data
origin authentication protocol which is adaptive depending on the packet error
rates as well as the time delay, and is robust against the packet loss and injec-
tion. Our model can estimate a more appropriate packet error rate and make the
time delay lower according to the feedback values got from the receivers using
the Markov chain so that it can be adaptive. This strategy is especially efficient
in terms of not only the adaptation of dynamic network but also the shortcut of
overhead and delay.
Keywords: Authentication, adaptive, estimate, packet error rate, time delay,
Markov chain.
1
Introduction
With the rapid development of broadcasting technology, it's applied to a lot of network
applications for group communication. The constantly abundance and development of
such applications makes the security and non-repudiation of group communication at-
tract more and more attention. At the same time, the efficiency is also very important
especially considering the low storage capacity nodes in the channel such as the mobile
phone users as well as the dynamic network conditions.
In the group communication channel, it's probable that the data packets on the way
be attacked by malicious participants or the adversary. So it's very necessary to guar-
antee the privacy as well as the non-repudiation. The digital signature can make sure
* This paper is supported by National Natural Science Foundation of China No.61272512 and
Beijing Municipal Natural Science Foundation No.4121001.
 
Search WWH ::




Custom Search