Advertisement

An Overview of Streamed Data Authentication Techniques

  • Beata J. Wysocki
Part of the Multimedia Systems and Applications Series book series (MMSA, volume 26)

Abstract

In the chapter we present some of the techniques proposed for authenticating digital streams. We start with the so-called block signatures, where every packet contains full information needed for its authentication. Then, we describe two techniques based on a simple hash chain for an off-line authentication and its modification where one-time signatures are used for an on-line authentication. Later, we consider the TESLA scheme for authenticating streams in case of synchronous systems. This is followed by augmented hash chains with signature packets used once per a sequence of packets rather than for the whole stream. The chapter is concluded with a short comparison of the considered techniques.

Key words

Streamed Data Authentication Hash Chain Digital Signature Gilbert-Elliot Channel 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    W. Stalings: Data and Computer Communications, 6th ed., Prentice Hall, Upper Saddle River, 2000.Google Scholar
  2. 2.
    J. Lu: “Signal Processing for Internet Video Streaming,” Proc. of SPIE, Image and Video Communications and Processing, January 2000.Google Scholar
  3. 3.
    G. Pipkin: http://www.itc.virginia.edu/atg/techtalks/powerpoint/video/sld001.htm “Video on the Web,” (accessed on 23/11/01).
  4. 4.
    Utah Education Network-http://www.uen.org/technical/html/streamingfaq.html (accessed on 23/11/01)
  5. 5.
    R. Gennaro, P. Rohatgi: “How to Sign Digital Streams,” Cypto’ 97, Springer-Verlag, 1998, pp. 180–197.Google Scholar
  6. 6.
    C. K. Wong, S. S. Lam: “Digital signatures for Flows and Multicasts,” IEEE/ACM Transactions on Networking, Vol.7.No.4, Aug. 1999, pp. 502–513.Google Scholar
  7. 7.
    M.J. Moyer, J.R. Rao and P. Rohatgi: “A Survey of Security Issues in Multicast Communications,” IEEE Network, Nov/Dec. 1999, pp. 12–23.Google Scholar
  8. 8.
    D.R. Stinson: “Cryptography Theory and Practice” CRC Press.Google Scholar
  9. 9.
    A. Perrig, R. Canetti, J.D. Tygar, D. Song: “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” Proc. of IEEE Security and Privacy Symposium, May 2000, pp. 56–73.Google Scholar
  10. 10.
    P. Golle, N. Modadugu: “Authenticating Streamed Data in the Presence of Random Packet Loss”, Proc. of Network and Distributed System Security Symposium, 8–9 February 2001.Google Scholar
  11. 11.
    S. Miner, J. Staddon: “Graph-Based Authentication of Digital Streams,” http://www-cse.ucsd.edu/users/sminer/abstracts/GraphAuth.html (accessed on: 11/01/02).
  12. 12.
    B.J. Wysocki, Y. Wang, and R. Safavi-Naini: “On a Method to Authenticate and Verify Digital Streams,” Journal of Telecommunications and Information technology, vol., No.2, pp. pp.45–52, 2002.Google Scholar
  13. 13.
    W. Stalings: “Cryptography and Network Security: Principles and Practice” 2nd ed., Prentice Hall, Upper Saddle River, 1998.Google Scholar
  14. 14.
    E. N. Gilbert, “Capacity of Burst-Noise Channel”, The Bell System Technical Journal, Sept. 1960, pp.1253–1265.Google Scholar
  15. 15.
    E. O. Elliott, “Estimates of Error Rates for Codes on Burst-Noise Channels”, The Bell System Technical Journal, Sept. 1963, pp. 1977–1997.Google Scholar

Copyright information

© Springer Science + Business Media, Inc. 2005

Authors and Affiliations

  • Beata J. Wysocki
    • 1
  1. 1.School of Electrical, Computer, and Telecommunications EngineeringUniversity of WollongongAustralia

Personalised recommendations