Efficient and Secure Source Authentication for Multicast

Adrian Perrig, Ran Canetti, Dawn Song, J. D. Tygar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

468 Scopus citations

Abstract

One of the main challenges of securing multicast communication is source authentication, or enabling receivers of multicast data to verify that the received data originated with the claimed source and was not modified en-route. The problem becomes more complex in common settings where other receivers of the data are not trusted, and where lost packets are not retransmitted. Several source authentication schemes for multicast have been suggested in the past, but none of these schemes is satisfactorily efficient in all prominent parameters. We recently proposed a very efficient scheme, TESLA, that is based on initial loose time synchronization between the sender and the receivers, followed by delayed release of keys by the sender. This paper proposes several substantial modifications and improvements to TESLA. One modification allows receivers to authenticate most packets as soon as they arrive (whereas TESLA requires buffering packets at the receiver side, and provides delayed authentication only). Other modifications improve the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks, and more.

Original languageEnglish
Title of host publicationProceedings of the Symposium on Network and Distributed System Security, NDSS 2001
PublisherThe Internet Society
ISBN (Electronic)189156210X, 9781891562105
StatePublished - 2001
Externally publishedYes
Event8th Symposium on Network and Distributed System Security, NDSS 2001 - San Diego, United States
Duration: 8 Feb 20019 Feb 2001

Publication series

NameProceedings of the Symposium on Network and Distributed System Security, NDSS 2001

Conference

Conference8th Symposium on Network and Distributed System Security, NDSS 2001
Country/TerritoryUnited States
CitySan Diego
Period8/02/019/02/01

Fingerprint

Dive into the research topics of 'Efficient and Secure Source Authentication for Multicast'. Together they form a unique fingerprint.

Cite this