A PROPOSAL OF BUTTERFLY−GRAPH BASED STREAM AUTHENTICATION OVER LOSSY NETWORKS (WedPmOR6)
نویسندگان
چکیده
In this paper, we propose a butterfly−graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to the nice properties of butterfly graph, the proposed scheme is quite robust and efficient. Theoretical analysis and simulation results show that the proposed scheme outperforms existing schemes in terms of overhead and authentication probability while maintaining the same levels of sender / receiver delay and robustness.
منابع مشابه
Content-aware authentication of motion JPEG2000 stream in lossy networks
—Stream authentication schemes (SAS) aim to achieve effective authentication of multicast streams over lossy networks. Almost all of the existing SASs are designed for stream data integrity protection only. In this paper, we argue that content integrity protection is more important than data integrity to human users. We present a content-aware SAS in Motion JPEG2000 streaming. In our scheme, a ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملGraph-Based Authentication of Digital Streams
We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hashand MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be...
متن کاملExpander Graphs for Digital Stream Authentication and Robust Overlay Networks
We use expander graphs to provide eÆcient new constructions for two security applications: authentication of long digital streams over lossy networks and building scalable, r obust overlay networks.Here is a summary of our contributions: (1) To authenticate long digital streams over lossy networks, we provide a construction with a provable lower bound on the ability to authenticate a packet | a...
متن کاملMulticast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005