Skip to main content

Collusion-Resistant Message Authentication in Overlay Multicast Communication

  • Chapter
Transactions on Computational Science IV

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 5430))

  • 647 Accesses

Abstract

This paper aims at providing message authentication service in overlay multicast. Previous work has mostly focused on the network layer IP multicast and not as much work has been done on the application layer overlay multicast. A main feature of overlay multicast is that end systems carry on the responsibility of delivering the multicast traffic. Taking advantage of this feature, this paper presents a new collusion resistant technique, which is based on digital signature, for overlay multicast message authentication. The proposed technique minimizes both the computational cost (through signature amortization) and the communication overhead (using retransmissions and utilizing multiple multicast groups in handling message loss). In addition, it resists denial of service attacks via early dropping of forged messages. A simulation study is conducted to evaluate our proposed technique. Results of the study show that the proposed technique outperforms earlier ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Banerjee, S., Kommareddy, C., Kar, K., Bhattacharjee, B., Khuller, S.: OMNI: An Efficient Overlay Multicast Infrastructure for Real-Time Applications. Computer Networks 50(6), 826–841 (2006)

    Article  Google Scholar 

  2. Bolot, J.-C.: End-To-End Packet Delay and Loss Behavior in the Internet. In: Proc. Sigcomm 1993, San Francisco, CA (1993)

    Google Scholar 

  3. Boneh, D., Durfee, G., Franklin, M.: Lower Bounds for Multicast Message Authentication. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 437–452. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Chu, Y., Rao, S., Seshan, S., Zhang, H.: Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture. In: Proc. of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, San Diego, CA, pp. 55–67 (2001)

    Google Scholar 

  5. Chu, Y., Rao, S., Seshan, S., Zhang, H.: A Case for End System Multicast. IEEE Journal on Selected Areas in Communications 20(8), 1456–1471 (2002)

    Article  Google Scholar 

  6. Dai, W.: Crypto++ 5.5 Benchmarks (2007), http://www.cryptopp.com/benchmarks.html

  7. Deering, S.: Host Extensions for IP Multicast, Internet RFC 1112 (1989)

    Google Scholar 

  8. Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)

    Google Scholar 

  9. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  10. Kasera, S., Kurose, J., Towsley, D.: Scalable Reliable Multicast using Multiple Multicast Groups. In: Proc. ACM Sigmetrics 1997, Seattle, WA, pp. 64–74 (1997)

    Google Scholar 

  11. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast Authentication in Fully Adversarial Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 241–253 (2004)

    Google Scholar 

  12. Mohamed, E., Abdel-Wahab, H.: Multicast for Multimedia Collaborative Applications: Services and Mechanisms. International Journal of Advanced Media and Communication (IJAMC) 1(3), 224–236 (2007)

    Article  Google Scholar 

  13. Mohamed, E., Abdel-Wahab, H.: Multicast Error Control for Multimedia Collaborative Applications. In: The 9th IEEE Symposium on Computers and Communications (ISCC 2004), Alexandria, Egypt (2004)

    Google Scholar 

  14. Pannetrat, A., Molva, R.: Efficient Multicast Packet Authentication. In: The 10th Annual Network and Distributed System Security Symposium (NDSS 2003), San Diego, CA (2003)

    Google Scholar 

  15. Park, J., Chong, E., Siegel, H.: Efficient Multicast Packet Authentication using Erasure Codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)

    Article  Google Scholar 

  16. Pendarakis, D., Shi, S., Verma, D., Waldvogel, M.: ALMI: An Application Level Multicast Infrastructure. In: Proc. of the 3rd Usenix Symposium on Internet Technologies and Systems (2001)

    Google Scholar 

  17. Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proc. of the 8th ACM Conference on Computer and Communications Security, Philadelphia, PA (2001)

    Google Scholar 

  18. Perrig, A., Canetti, R., Tygar, J., Song, D.: The Tesla Broadcast Authentication Protocol. CryptoBytes 5(2), 2–13 (2002)

    Google Scholar 

  19. Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: 6th ACM Conference of Computing and Communication Security CCS 1999, Singapore (1999)

    Google Scholar 

  20. Wong, C., Lam, S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)

    Article  Google Scholar 

  21. Yajnik, M., Kurose, J., Towsley, D.: Packet Loss Correlation in the Mbone Multicast Network: Experimental Measurements and Markov Chain Models. In: Proc. IEEE Globecom, pp. 94–99 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Mohamed, E.E., Abdel-Wahab, H. (2009). Collusion-Resistant Message Authentication in Overlay Multicast Communication. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science IV. Lecture Notes in Computer Science, vol 5430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01004-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01004-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01003-3

  • Online ISBN: 978-3-642-01004-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics