DocumentCode :
3508887
Title :
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency
Author :
Yichuan Wang ; Jianfeng Ma ; Di Lu ; Liumei Zhang ; Xiang Lu
Author_Institution :
Sch. of Comput. Sci. & Technol., Xidian Univ., Xi´an, China
fYear :
2013
fDate :
9-11 Sept. 2013
Firstpage :
85
Lastpage :
92
Abstract :
Security and efficiency of messages transmission are crucial requirements for multicast data origin authentication, especially in time-critical scenarios, such as pay-TV and the smart grid. However, how to balance such equirements is still a difficult issue. Through analysis, we find that TV-HORS is more suitable for the time-critical scenarios than RSA-based and MAC-based scheme. However, the reuse times of TV-HORS scheme is still too small to suit some scenarios. In this paper, we present a Game Model of Multicast Data Origin Authentication (GMMDOA), to describe the relationship between security and efficiency for the time-critical multicast communication, contra posing the TV-HORS scheme. By analyzing our model with Shannons information and game theory, we propose an optimization scheme for update the private key. Through the security analysis of our model, the signature valid time is negligible compared with the adversary attacking time. Thus, the security of our scheme is still secure even in the lowest risk-level parameter. We present measurement results from experiments and discuss performance comparisons. It shows that, our scheme does significantly to promote the efficiency of multicast data origin authentication.
Keywords :
game theory; multicast communication; optimisation; private key cryptography; telecommunication security; GMMDOA model; MAC-based scheme; RSA-based scheme; Shannon information; TV-HORS scheme; adversary attacking time; data efficiency; data security; game model of multicast data origin authentication; game optimization; message transmission; optimization scheme; private key update; security analysis; time-critical multicast communication; time-critical multicast data origin authentication; time-critical scenarios; Analytical models; Authentication; Games; Nash equilibrium; Smart grids; Time factors; data origin authentication; game theory; multicast; re-keying scheme;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
Conference_Location :
Xi´an
Type :
conf
DOI :
10.1109/INCoS.2013.51
Filename :
6630293
Link To Document :
بازگشت