Broadcast authentication for group communication

نویسندگان

  • Reihaneh Safavi-Naini
  • Huaxiong Wang
چکیده

Traditional point-to-point message authentication systems have been extensively studied in the literature. In this paper, we consider authentication systems for group communication. The basic primitive is a multireceiver authentication system with dynamic senders (DMRA-code). In a DMRA-code any member of the group can broadcast an authenticated message to the rest of the group such that every other member of the group can individually verify the authenticity of the message. We give a 0exible ‘synthesis’ construction for DMRA-codes by combining an A-code and a key distribution pattern. tDMRA-codes extend this model when there are up to t senders. We give two constructions, one algebraic and one by ‘synthesis’ of an A-code and a perfect hash family. We show universality of ‘synthesis’ constructions for unconditional and computational models of security which means that our results have wider range applications. Finally, to demonstrate the usefulness of DMRA model, we modify a secure dynamic conferencekey distribution system to construct a secure dynamic conference system that provides secrecy and authenticity of communication among conferencees. The system is key-e5cient as its key requirement remains nearly the same as the original conference key distribution system and so authentication is e7ectively obtained without any extra cost. We discuss possible extensions to this work. c © 2001 Elsevier Science B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

I . The TESLA Broadcast Authentication Protocol

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. The autho...

متن کامل

Ensuring Feasible Communication for Integrating Wireless Sensor Networks Into The Internet of Things

Wireless sensor network is a group of specialized transducer with communication infrastructure for monitoring and recording at diverse location. There is a need for a secure channel between a sensor node and an internet host, during the integration of wireless sensor networks into the internet of things. By using Security protocols for Sensor networks (SPINS) scheme, it is possible to secure co...

متن کامل

HBSAP : A Hop-by-Hop Broadcast Source Authentication Protocol for WSN to mitigate DoS Attacks

Broadcast communication is a dominant communication pattern in WSN. As a major security concern, the broadcast source authentication is needed to mitigate impersonation of a broadcast source, modifications of its broadcasted data, or depletion of the limited energy of sensors caused by an attacker injecting useless broadcast traffic. Several Broadcast Source Authentication Protocols (BSAPs) wer...

متن کامل

An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol

Lei et al. [26] proposed a new asymmetric group key agreement protocol allowing a set of users to negotiate a common encryption key accessible by any user, and each user holds her respective decryption key. This enables the confidential message communication among group users, and grants any outsider to send message to the group. In this paper, an authenticated asymmetric group key agreement pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 269  شماره 

صفحات  -

تاریخ انتشار 2001