CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

MAC based Approaches for Multicast Source Authentication

by Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 2
Year of Publication: 2012
Authors: Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar
10.5120/4583-6503

Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar . MAC based Approaches for Multicast Source Authentication. International Journal of Computer Applications. 37, 2 ( January 2012), 42-50. DOI=10.5120/4583-6503

@article{ 10.5120/4583-6503,
author = { Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar },
title = { MAC based Approaches for Multicast Source Authentication },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 2 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 42-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number2/4583-6503/ },
doi = { 10.5120/4583-6503 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:17.747370+05:30
%A Ramanpreet Kaur
%A Amrit Lal Sangal
%A Krishan Kumar
%T MAC based Approaches for Multicast Source Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 2
%P 42-50
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the explosive growth of the internet and growing demand for novel types of group communication, simultaneous transmission of digital information becomes prevalent model of communication. They have applications in TV over internet, video-conferencing, news feeds, stock quotes, online video games and software updates. Some of them need one to many communications while others need many to many communications. So in these applications authenticating members of multicast groups to verify that it is originated from authenticated source plays a significant role. A large number of protocols are proposed to support source authentication in multicasting. In this paper we classify the existing source authentication protocols and describe the MAC based protocols to verify the identity of sender.

References
  1. Adi Shamir,” How to share a secret,” Communication of the ACM, 22(11):612 – 613, November 1979.
  2. Adrain Perrig, Ran Canetti, Dawn Song, and J. D.Tygar,” Ef?cient and secure source authentication for multicast,” In NDSS 2001, pages 35 – 46, San Diego, USA, February 2001. Internet Society.
  3. Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song,” Ef?cient authentication and signing of multicast streams over lossy channels,” In IEEE Symposium on Security and Privacy, pages 56 – 73, Oakland, USA, May 2000. IEEE Press.
  4. Adrian Perrig et al., “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, Summer 2002.
  5. Alain Pannetrat,Refik Molva ,” Efficient Multicast Packet Authentication,” In Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003). Internet Society, Feb. 2003.
  6. Christophe Tartary,” Authentication for Multicast Communication,” PhD thesis, Macquarie University, October 2007.
  7. D.Boneh,G.Durfee, and M. Franklin,”Lower Bounds for Multicast Message Authentication,”Eurocrypt ’01, LNCSvol.,no. 2045, 2001, pp. 437-52.
  8. Francesco Bergadano, Davide Cavagnino, and Bruno Crispo. Individual single source authentication on the MBONE. In ICME 2000, volume 1, pages 541 – 544,New York, USA, July 2000. IEEE Signal Processing Society.
  9. Gustavus J. Simmons,” A survey of information authentication,”Proceedings of the IEEE,76(5):603 – 620, May 1988.
  10. H. Fujii, W. Kachen, and K. Kurosawa ,”Combinatorial Bounds and Design of Broadcast Authentication,” IEICE Trans., E79-Avol., no. 4, 1996, pp. 502-06.
  11. K. Kurosawa and S. Obana,”Characterization of (k,n) Multireceiver Authentication,” Information Security and Privacy, ACISP’97, LNCS, vol., no. 1270, 1997, pp. 204 15.
  12. Paul Judge and Mostafa Ammar ,”Security Issues and Solutions in Multicast Content Distribution:A Survey”,IEEE Network,Jan/Feb. 2003,pp.30-36.
  13. Qing Li and Wade Trappe ,” Staggered TESLA:A Multicast Authentication Scheme Resistant to Dos Attacks “,In IEEE Global Telecommunication Conference (Globecom’05) Volume 3 ,November 2005.
  14. Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, and Benny Pinkas,” Multicast security: A taxonomy and ef?cient constructions,” In IEEE Conference on Computer Communications, volume 1, pages 708–716, New York, USA, March 1999. IEEE Press.
  15. Rei Safavi-Naini and Huaxiong Wang,” New results on multi-receiver authentication code,” In Advances in Cryptology - Eurocrypt’98, volume 1403 of Lecture Notes in Computer Science,pages 527 – 541, Espoo, Finland, June 1998. Springer - Verlag.
  16. Rei Safavi-Naini and Huaxiong Wang,” Multireceiver authentication codes: Models, bounds, constructions, and extensions,”Information and Computation, 151(1-2):148 172, May 1999.
  17. S. Obana and K. Kurosawa, “Bounds and Combinatorial Structure of (k, n) Multi-receiver A codes,” Designs, Codes and Cryptography, vol. 22, no. 1, 2001, pp. 47-63.
  18. Yvo Desmedt, Yair Frankel, and Moti Yung,”Multi receiver/multi-sender network security:Ef?cient authenticated multicast/feedback,” In IEEE INFOCOM 1992, volume 3, pages 2045 –2054, Florence, Italy,May 1992. IEEE Press.
  19. Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of mukticast Data Origin Authentication:Issues and Solutions,”IEEE Communication Surveys ,Third Quarter 2004.
  20. Y. Challal, H. Bettahar, and A. Bouabdallah, “A2Cast: An Adaptive Source Authentication Protocol for MultiCast Streams,” IEEE- ISCC’2004, June 2004
Index Terms

Computer Science
Information Sciences

Keywords

MAC Multicast Source Authentication Group communication security