메뉴 건너뛰기




Volumn 1, Issue 2, 2006, Pages 190-204

Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security

Author keywords

Denial of service (DoS) attacks; Forge capable area; Message authentication code (MAC); Multigrade source authentication; Queueing theory; Timed efficient stream loss tolerant authentication (TESLA); Trust

Indexed keywords

DENIAL-OF-SERVICE (DOS) ATTACKS; FORGE-CAPABLE AREA; MESSAGE AUTHENTICATION CODE (MAC); MULTIGRADE SOURCE AUTHENTICATION;

EID: 33744777485     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.873599     Document Type: Article
Times cited : (19)

References (30)
  • 4
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Aug.
    • C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Netw., vol. 7, no. 4, pp. 502-513, Aug. 1999.
    • (1999) IEEE/ACM Trans. Netw. , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1    Lam, S.2
  • 5
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication," in Proc. 6th ACM Conf. Computer Communications Security, 1999, pp. 93-100.
    • (1999) Proc. 6th ACM Conf. Computer Communications Security , pp. 93-100
    • Rohatgi, P.1
  • 6
    • 0036079874 scopus 로고    scopus 로고
    • Efficient multicast packet authentication using signature amortization
    • J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization," in Proc. IEEE Symp. Security Privacy, 2002, pp. 227-240.
    • (2002) Proc. IEEE Symp. Security Privacy , pp. 227-240
    • Park, J.M.1    Chong, E.K.P.2    Siegel, H.J.3
  • 7
    • 1542625909 scopus 로고    scopus 로고
    • Efficient multicast stream authentication using erasure codes
    • J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Trans. Information System Security, vol. 6, no. 2, pp. 258-285, 2003.
    • (2003) ACM Trans. Information System Security , vol.6 , Issue.2 , pp. 258-285
    • Park, J.M.1    Chong, E.K.P.2    Siegel, H.J.3
  • 11
    • 0035752112 scopus 로고    scopus 로고
    • The BiBa one-time signature and broadcast authentication protocol
    • Nov.
    • A. Perrig, "The BiBa one-time signature and broadcast authentication protocol," in Proc. 8th ACM Conf. Computer Communication Security, Nov. 2001, pp. 28-37.
    • (2001) Proc. 8th ACM Conf. Computer Communication Security , pp. 28-37
    • Perrig, A.1
  • 12
    • 0036040034 scopus 로고    scopus 로고
    • Authenticated multicast immune to denial-of-service attack
    • S. Xu and R. Sandhu, "Authenticated multicast immune to denial-of-service attack," in ACM Symp. Applied Computing, 2002, pp. 196-200.
    • (2002) ACM Symp. Applied Computing , pp. 196-200
    • Xu, S.1    Sandhu, R.2
  • 13
    • 0031383687 scopus 로고    scopus 로고
    • An efficient message authentication scheme for link state routing
    • Dec.
    • S. Cheung, "An efficient message authentication scheme for link state routing," in Proc. 13th Annu. Computer Security Applications Conf., Dec. 1997, pp. 90-98.
    • (1997) Proc. 13th Annu. Computer Security Applications Conf. , pp. 90-98
    • Cheung, S.1
  • 17
    • 33744722595 scopus 로고    scopus 로고
    • FLAMeS: Fast, loss-tolerant authentication of multicast streams
    • BT Research
    • B. Briscoe, FLAMeS: Fast, Loss-Tolerant Authentication of Multicast Streams, http://www.labs.bt.com., Tech. Rep., BT Research, 2000.
    • (2000) Tech. Rep.
    • Briscoe, B.1
  • 18
    • 2342610452 scopus 로고    scopus 로고
    • TESLA: Multicast source authentication transform introduction
    • draft-ietf-msec-tesla-intro-01.txt
    • A. Perrig, R. Canetti, D. Song, J. D. Tygar, and B. Briscoe, "TESLA: multicast source authentication transform introduction," IETF Working Draft, draft-ietf-msec-tesla-intro-01.txt.
    • IETF Working Draft
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J.D.4    Briscoe, B.5
  • 20
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
    • (2002) RSA Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 21
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symp. Security Privacy, 2000, pp. 56-73.
    • (2000) Proc. IEEE Symp. Security Privacy , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 23
    • 0035510001 scopus 로고    scopus 로고
    • MPEG-4 and H.263 video traces for network performance evaluation
    • Nov./Dec.
    • F. H. P. Fitzek and M. Reisslein, "MPEG-4 and H.263 video traces for network performance evaluation," IEEE Netw., vol. 15, no. 6, pp. 40-54, Nov./Dec. 2001.
    • (2001) IEEE Netw. , vol.15 , Issue.6 , pp. 40-54
    • Fitzek, F.H.P.1    Reisslein, M.2
  • 25
    • 0038703640 scopus 로고    scopus 로고
    • Dv-based positioning in ad hoc networks
    • D. Niculescu and B. Nath, "Dv-based positioning in ad hoc networks," Telecommun. Syst., pp. 267-280, 2003.
    • (2003) Telecommun. Syst. , pp. 267-280
    • Niculescu, D.1    Nath, B.2
  • 26
    • 84948668912 scopus 로고    scopus 로고
    • Hysor: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers
    • J. Fan, P. Judge, and M. H., "Hysor: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers," in Proc. 11th Int. Conf. Computer Communications Networks, 2002, pp. 196-201.
    • (2002) Proc. 11th Int. Conf. Computer Communications Networks , pp. 196-201
    • Fan, J.1    Judge, P.2    H., M.3
  • 27
  • 28
    • 84858892210 scopus 로고    scopus 로고
    • Network time protocol (version 3) specification, implementation and analysis
    • D. Mills, "Network Time Protocol (Version 3) Specification, Implementation and Analysis," IETF RFC [Online]. Available: http://www.ietf.org/rfc/rfc1305.txt
    • IETF RFC [Online]
    • Mills, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.