Information Technology Reference
In-Depth Information
350
time delay(n=128)
time delay(n=64)
time delay(n=32)
time delay(n=128)
time delay(n=64)
time delay(n=32)
350
300
300
250
250
200
200
150
150
1
2
3
4
5
6
1
2
3
4
5
6
check point
check point
Fig. 9. Time delay decreases/increases with n = n / 2 at the check point 4
Our scheme achieved the highest verification probability with less overhead within a
certain range and adjusted the parameters dynamically in the changeable network
environment which the other schemes cannot solve.
And obviously, our scheme might not be appropriate in situations where the data to
be sent is generated in real time, and immediate broadcast of it is crucial. Our scheme
will be most useful in situations where it needs high authentication rate and efficiency
with less overhead but the network varies frequently and irregularly.
References
1. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using
signature amortization. In: Proc. IEEE Symposium on Security and Privacy, pp. 227-240
(2002)
2. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of
multicast streams over lossy channels. In: Proc. IEEE Symposium on Security and Privacy,
pp. 56-73 (2000)
3. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adver-
sarial networks. In: Proc. IEEE Symposium on Security and Privacy, p. 241 (2004)
4. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Authenticated error-correcting codes
with applications to multicast authentication. In: Proc. ACM Trans. Inf. Syst. Secur.
(2010)
5. Li, Y., Zhang, M., Guo, Y., Xu, G.: Optimized source authentication scheme for multicast
based on Merkle Tree and TESLA. In: Proc. Information Theory and Information Security
(ICITIS), pp. 195-198 (2010)
6. Ahmadzadeh, S.A., Agnew, G.B.: Poster: a geometric approach for multicast authentica-
tion in adversarial channels. In: Proc. ACM Conference on Computer and Communica-
tions Security, pp. 729-732 (2011)
7. Liu, Y., Li, J., Guizani, M.: PKC Based Broadcast Authentication using Signature Amorti-
zation for WSNs. In: Proc. IEEE Transactions on Wireless Communications, pp. 2106-2115
(2012)
8. Balasubramanian, K., Roopa, R.: HTSS: Hash Tree Signature Scheme for Multicast Au-
thentication. In: Proc. International Conference on Recent Trends in Computational Me-
thods, Communication and Controls (ICON3C 2012), pp. 28-32 (2012)
Search WWH ::




Custom Search