A PROPOSAL OF BUTTERFLY−GRAPH BASED STREAM AUTHENTICATION OVER LOSSY NETWORKS (WedPmOR6)

نویسندگان

  • Zhishou Zhang
  • Qibin Sun
  • Wai−Choong Wong
چکیده

In this paper, we propose a butterfly−graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to the nice properties of butterfly graph, the proposed scheme is quite robust and efficient. Theoretical analysis and simulation results show that the proposed scheme outperforms existing schemes in terms of overhead and authentication probability while maintaining the same levels of sender / receiver delay and robustness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Content-aware authentication of motion JPEG2000 stream in lossy networks

—Stream authentication schemes (SAS) aim to achieve effective authentication of multicast streams over lossy networks. Almost all of the existing SASs are designed for stream data integrity protection only. In this paper, we argue that content integrity protection is more important than data integrity to human users. We present a content-aware SAS in Motion JPEG2000 streaming. In our scheme, a ...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Graph-Based Authentication of Digital Streams

We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hashand MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be...

متن کامل

Expander Graphs for Digital Stream Authentication and Robust Overlay Networks

We use expander graphs to provide eÆcient new constructions for two security applications: authentication of long digital streams over lossy networks and building scalable, r obust overlay networks.Here is a summary of our contributions: (1) To authenticate long digital streams over lossy networks, we provide a construction with a provable lower bound on the ability to authenticate a packet | a...

متن کامل

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005