CINXE.COM

{"title":"Signing the First Packet in Amortization Scheme for Multicast Stream Authentication","authors":"Mohammed Shatnawi, Qusai Abuein, Susumu Shibusawa","volume":38,"journal":"International Journal of Computer and Information Engineering","pagesStart":203,"pagesEnd":208,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/15967","abstract":"Signature amortization schemes have been introduced\r\nfor authenticating multicast streams, in which, a single signature is\r\namortized over several packets. The hash value of each packet is\r\ncomputed, some hash values are appended to other packets, forming\r\nwhat is known as hash chain. These schemes divide the stream into\r\nblocks, each block is a number of packets, the signature packet in\r\nthese schemes is either the first or the last packet of the block.\r\nAmortization schemes are efficient solutions in terms of computation\r\nand communication overhead, specially in real-time environment.\r\nThe main effictive factor of amortization schemes is it-s hash chain\r\nconstruction. Some studies show that signing the first packet of each\r\nblock reduces the receiver-s delay and prevents DoS attacks, other\r\nstudies show that signing the last packet reduces the sender-s delay.\r\nTo our knowledge, there is no studies that show which is better, to\r\nsign the first or the last packet in terms of authentication probability\r\nand resistance to packet loss.\r\nIn th is paper we will introduce another scheme for authenticating\r\nmulticast streams that is robust against packet loss, reduces the\r\noverhead, and prevents the DoS attacks experienced by the receiver\r\nin the same time. Our scheme-The Multiple Connected Chain signing\r\nthe First packet (MCF) is to append the hash values of specific\r\npackets to other packets,then append some hashes to the signature\r\npacket which is sent as the first packet in the block. This scheme\r\nis aspecially efficient in terms of receiver-s delay. We discuss and\r\nevaluate the performance of our proposed scheme against those that\r\nsign the last packet of the block.","references":"[1] S. Miner and J. Staddon, \"Graph-based authentication of digital\r\nstreams,\" Proc. of the IEEE Symposium on Research in Security and\r\nPrivacy, pp.232-246, May 2001.\r\n[2] J. Park, E. Chong and H. Siegel, \"Efficient multicast stream authentication\r\nusing erasure codes,\" ACM Trans. on Information and System\r\nSecurity, vol.6, no.2, pp.258-258, May 2003.\r\n[3] Q. Abuein and S. Shibusawa, \"The performance of amortization scheme\r\nfor secure multicast streaming,\" Proc. of the 6th Int. Workshop on\r\nInformation Security Application, Jeju Island, Korea, Aug. 2005\r\n[4] Q. Abuein and S. Shibusawa, \"Signature amortization using multiple\r\nconnected chains,\" Proc. of Springer LNCS 9th IFIP TC-6 TC-11 Int.\r\nConf. on CMS, Sep. 2005.\r\n[5] Q. Abuein and S. Shibusawa, A Graph-based new amortization scheme\r\nfor multicast streams authentication, Journal of Advanced Modeling and\r\nOptimization, Vol. 7, No. 2, pp.238-261, 2005.\r\n[6] H. Sanneck, G. Carle, and R. Koodli, \"A framework model for packet\r\nloss metrics based on loss runlengths,\" SPIE\/ACM SIGMM Multimedia\r\nComputing and Networking Conf., Jan. 2000.\r\n[7] W. Jiang and H. Schulzrinne, \"Modeling of packet loss and delay and\r\ntheir effect on real-time multimedia service quality,\" Proc. of 10th Int.\r\nWorkshop on Network and Operations System Support for Digital Audio\r\nand Video, June 2000.\r\n[8] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, \"Efficient authentication\r\nand signing of multicast streams over lossy channels,\" IEEE Symposium\r\non Security and Privacy, pp.56-73, May 2000.\r\n[9] P. Rohatgi, \"A compact and fast hybrid signature scheme for multicast\r\npacket authentication,\" Proc. of the 6th ACM Conf. on Computer and\r\nCommunications Security, 1999.\r\n[10] P. Golle and N. Modadugu. \"Authenticating streamed data in the\r\npresence of random packet loss,\" Proc. of ISOC Network and Distributed\r\nSystem Security Symposium, pp.13-22, 2001.\r\n[11] R. Gennaro, and P. Rohatgi, \"How to sign digital streams,\" Advances\r\nin Cryptology - CRYPTO-97, pp.180-197, 1997.\r\n[12] A. Chan, \"A graph-theoretical analysis of multicast authentication,\" Proc.\r\nof the 23rd Int. Conf. on Distributed Computing Systems, 2003.\r\n[13] P. Alain and M. Refik, \"Authenticating real time packet stream and\r\nmulticast,\" Proc. of 7th IEEE Symposium on Computers and Communications,\r\nJuly 2002.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 38, 2010"}