A source authentication and data confidentiality scheme for multicast networks
Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IIUM Press
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf |
id |
iium-53007 |
---|---|
recordtype |
eprints |
spelling |
iium-530072017-02-07T03:02:20Z http://irep.iium.edu.my/53007/ A source authentication and data confidentiality scheme for multicast networks Benmachiche, Abderrahim Ali, Salami Messikh Azeddine, Azeddine T Technology (General) Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much. IIUM Press 2016 Article PeerReviewed application/pdf en http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf Benmachiche, Abderrahim and Ali, Salami and Messikh Azeddine, Azeddine (2016) A source authentication and data confidentiality scheme for multicast networks. International Journal on Perceptive and Cognitive Computing, 2 (2). pp. 1-4. ISSN 2462-229X http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Benmachiche, Abderrahim Ali, Salami Messikh Azeddine, Azeddine A source authentication and data confidentiality scheme for multicast networks |
description |
Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much. |
format |
Article |
author |
Benmachiche, Abderrahim Ali, Salami Messikh Azeddine, Azeddine |
author_facet |
Benmachiche, Abderrahim Ali, Salami Messikh Azeddine, Azeddine |
author_sort |
Benmachiche, Abderrahim |
title |
A source authentication and data confidentiality scheme for multicast networks |
title_short |
A source authentication and data confidentiality scheme for multicast networks |
title_full |
A source authentication and data confidentiality scheme for multicast networks |
title_fullStr |
A source authentication and data confidentiality scheme for multicast networks |
title_full_unstemmed |
A source authentication and data confidentiality scheme for multicast networks |
title_sort |
source authentication and data confidentiality scheme for multicast networks |
publisher |
IIUM Press |
publishDate |
2016 |
url |
http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf |
first_indexed |
2023-09-18T21:15:04Z |
last_indexed |
2023-09-18T21:15:04Z |
_version_ |
1777411507303219200 |