Immediate Data Authentication for Multicast in Resource Constrained Network

  • C. K. Wong
  • Agnes Chan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)


In this paper, we consider the problem of authentication of multicast data. The TESLA scheme was introduced to provide data authentication for multicast communication over lossy channels. Later, TESLA was further improved to offer immediate authentication of packets and fortifications against denial-of-service attacks. The improved TESLA scheme is efficient and applicable to mobile resource-constrained receivers for authentication of multicast data. The resource limitation of mobile resource-constrained receivers gives additional challenges to multicast authentication. In this paper, a denial-of-service attack called the Random-Substitution attack is presented. We present a new scheme that can provide immediate packet authentication and deter the Random-Substitution attack. It is also robust against packet losses. In addition, the new scheme allows a receiver to immediately authenticate all packets upon arrival, when the receiver joins the multicast communication. Hence, the new scheme offers a practical multicast authentication solution for resource-constrained receivers.


Packet Loss Signature Scheme Message Authentication Code Receive Packet Data Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Haller, N.: The S/KEY one-time password system. Request for Comments (Informational) 1760, Internet Engineering Task Force (February 1995)Google Scholar
  2. 2.
    Lamport, L.: Password authentication with insecure communication. ACM Commun. 24(11) ( November 1981)Google Scholar
  3. 3.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Symposium on Security and Privacy (2000)Google Scholar
  4. 4.
    Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and Secure Source Authentication for Multicast. In: Proc. of NDSS 2001 (2001)Google Scholar
  5. 5.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun. 21(2), 120–126 (1978)zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    U. S. National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS), Federal Register 56. FIPS PUB 186 (August 1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • C. K. Wong
    • 1
  • Agnes Chan
    • 1
  1. 1.Northeastern UniversityBostonUSA

Personalised recommendations