期刊文献+

组播数据源认证研究进展

State-of-the-art in multicast data origin authentication
在线阅读 下载PDF
导出
摘要 首先讨论了源认证的要求和分类,总结了源认证方案的性能评价标准,然后对组播数据源认证领域的现有成果进行了系统的分类和总结,对具有代表性的组播数据源认证协议进行分析和评价,指出了它们各自存在的优缺点,并讨论了数据源认证未来一些可能的研究方向。 This paper first discussed the requirement and classification of data origin authentication, and summarized the standard of evaluation about data origin authentication. Then systematically classified and summarized the current research re- sults on multicast data origin anthentication, analyzed and evaluated several typical data origin authentication protocols, and recognized their benefits and limitations. Furthermore, it provided the future research trend in the area.
出处 《计算机应用研究》 CSCD 北大核心 2011年第12期4401-4404,4425,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z443) 国家博士点基金资助项目(20070614008)
关键词 组播 组播安全 消息认证码 数据源认证 multicast muhicast security message authentication code data origin authentication
  • 相关文献

参考文献18

  • 1DEERING S E, CHERITON. RFC 966, Host groups: a muhicast exten- sion to the Internet protocol[ S]. 1985.
  • 2HARDJONO T ,TSUDIK G. IP multicast security:issues and directions [ R ]. [ S. 1. ] : Annales de Telecom,2000 : 324 - 340.
  • 3CANETTI R, GARAY J, ITKtS G,et al. Multicast security : a taxonomy and efficient constructions [ C ]//Proc of IEEE INFOCOM. Washing-ton DC : IEEE Computer Society, 1999:708-716.
  • 4PERRIG A, SONG D, CANETYI R, et al. RFC 4082, TESLA : multi- cast source authentication transform introduction[ S]. 2005.
  • 5ADRIAN P. The BiBa one-time signature and broadcast authentication protocol[ C]//Pmc of the 8th ACM Conference on Computer and Communication Security. New York : ACM Press, 2001 : 28- 37.
  • 6HINARD Y, BETTAHAR H, CHALLAL Y, et al. Layered multicast data origin "authentication and non-repudiation over lossy networks [ C]//Proc of the llth IEEE Symposium on Computer and Communi- cations. 2006 : 662- 669.
  • 7ELTAIEF H, YOUSSEF H. RMLCC: recovery-based multi-layer con- nected chain mechanism for multicast source authentication [ C ]// Proc of the 35th Annual IEEE Conference on Local Computer Net- works. 2010:432-440.
  • 8ZHOU Yun, FANG Yu-guang. Multicast authentication over lossy channels[ C ]//Proc of IEEE Military Communications Conference. 2007 : 1-7.
  • 9SINGH K, YADAV R S, SHARMA A K. Adaptive multicast source au- thentication[ C ]//Proc of IEEE International Advance Computing Conference. 2009 : 1308-1313.
  • 10PERRIG A, CANETTI R, TYGAR J D, et.al. Efficient authentication and signing of multicast streams over lossy channels [ C ]//Proc of IEEE Symposium on Security and Privacy. Washington DC: IEEE Computer Society,2000:56-73.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部