Solving the Authentication Problem for Real-Time Data Streams

Article Preview

Abstract:

For the authentication problem of real-time data stream, the authentication schemes for real-time data stream based on digital signature are studied in this paper. According to the transmission characteristics of real-time data stream, the concept of authentication window is proposed, and three authentication schemes are designed based on the hash function and digital signature technology. In the three schemes, the authentication information of a packet is taken by itself, the next one, and the previous one, respectively. The structure and process of each scheme are presented. The authentication efficiency is studied from the two aspects of transmission density and authentication window, and the dynamic value of authentication window is also researched. Simulation results show that the second scheme has better performance, suitable for the authentication of real-time data stream travelling over insecure network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1356-1360

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Qing Li; Trappe, W. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security[J]. IEEE Transactions on Information Forensics and Security, 2006, vol 1, 190-204.

DOI: 10.1109/tifs.2006.873599

Google Scholar

[2] Jinwei Wang; Shiguo Lian; Guangjie Liu. On the analysis and design of secure multimedia authentication scheme[C]. Third International Conference on Communications and Networking in China, 2008. 1298-1302.

DOI: 10.1109/chinacom.2008.4685264

Google Scholar

[3] Chuhong Fei; Kundur, D.; Kwong, R.H. Analysis and design of secure watermark-based authentication systems[J]. IEEE Transactions on Information Forensics and Security, 2006, vol 1, issue 1, 43-55.

DOI: 10.1109/tifs.2005.863505

Google Scholar

[4] Suzuki, S.; Nakada, K. An authentication technique based on distributed security management for the global mobility network[J]. IEEE Journal on Selected Areas in Communications, 1997, vol 15, issue 8, 1608-1617.

DOI: 10.1109/49.634798

Google Scholar

[5] Peng Kunyu; Zheng Jiande; Yang Jing. An identity authentication system based on mobile phone token[C]. IEEE International Conference on Network Infrastructure and Digital Content, 2009. 570-575.

DOI: 10.1109/icnidc.2009.5360974

Google Scholar

[6] Zheng, G.; Ma, H. -T.; Cheng, C.; Tu, Y. -C. Design and logical analysis on the access authentication scheme for satellite mobile communication networks[J]. IET Information Security, 2012, vol 6, issue 1, 6-13.

DOI: 10.1049/iet-ifs.2010.0233

Google Scholar

[7] Oligeri, G.; Chessa, S.; Barsocchi, P.; Giunta, G.; Chan, P.M.L.; Pillai, P. Real-time loss tolerant video streaming authentication for satellite links[C]. International Workshop on Satellite and Space Communications, 2009, 125-129.

DOI: 10.1109/iwssc.2009.5286403

Google Scholar

[8] Abdellatif, R.; Aslan, H.K.; Elramly, S.H. New real time multicast authentication protocol[C]. International Conference on Computer Engineering and Systems, 2008. 245-250.

DOI: 10.1109/icces.2008.4773005

Google Scholar

[9] Piron, L.; Le Buhan, C.; Moreillon, G.; Wilson, R. On the integrity and authentication protection of real time data in broadcast networks[C]. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, 1-4.

DOI: 10.1109/isbmsb.2008.4536613

Google Scholar

[10] Bossie, C.; Fiorini, P.M. A Dynamic Authentication Mechanism for Real-Time Network Security[C]. IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2005. 360-365.

DOI: 10.1109/idaacs.2005.283004

Google Scholar