DocumentCode :
3116467
Title :
Graph-based authentication of digital streams
Author :
Miner, Sara ; Staddon, Jessica
Author_Institution :
Dept. of Comput. Sci. & Eng., California Univ., San Diego, La Jolla, CA, USA
fYear :
2001
fDate :
2001
Firstpage :
232
Lastpage :
246
Abstract :
We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hash- and MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within reasonable constraints on the input parameters, we provide schemes that achieve the desired authentication probability while meeting the input upper bound on the overhead per packet. In addition, we demonstrate that some of the shortcomings of previously known schemes correspond to easily identifiable properties of a graph, and hence, may be more easily avoided by taking a graph-based approach to designing authentication schemes
Keywords :
message authentication; packet switching; telecommunication security; MAC-based techniques; authentication schemes; bursty packets; digital streams; graph-based authentication; hash-based techniques; loss pattern; lossy network; message authentication code; random packet loss; Authentication; Bandwidth; Computer science; Data privacy; Drives; Feeds; Public key; Silicon; TV; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-7695-1046-9
Type :
conf
DOI :
10.1109/SECPRI.2001.924301
Filename :
924301
Link To Document :
بازگشت